"Future-proofing is the process of anticipating the future and developing methods of minimizing the effects of shocks and stresses of future events."
Questions tagged [future-proofing]
9 questions
27
votes
7 answers
Is sha1sum still secure for downloadable software packages signature?
We use sha1sum to calculate SHA-1 hash value of our packages.
Clarification about the usage:
We distribute some software packages, and we want users to be able to check that what they downloaded is the correct package, down to the last bit.
The…
Michael
- 1,457
- 1
- 18
- 36
9
votes
4 answers
How can we factor Moore's law into password cracking estimates?
How would we go about factoring Moore's law into exceedingly long password cracking estimates?
Let's say we've got a 12 character password containing mixed-case alpha characters and numbers, i.e. a-z, A-Z and 0-9. The keyspace for such a password is…
Polynomial
- 132,208
- 43
- 298
- 379
3
votes
1 answer
How could supply chain counterfeiting be combated by using a blockchain?
In the popular technology and business press (e.g. example1, example2 and example3) there is a lot of excitement around the application of a blockchain to "revolutionize the supply chain" of physical products. It is argued that it can be used to…
G_T
- 141
- 2
2
votes
2 answers
Proof of Work as password hash a good idea?
Our users log in with username/password, and have a cookie that allows them to remain logged in. Our users are expected to run updated versions of JS.
Assuming someone snags our database at some point,
Is it a good idea to reduce the entropy of our…
powersupply
- 391
- 3
- 6
1
vote
3 answers
Is cryptography possible without volatile memory?
AFAIK, our current disk encryption methods (dm-crypt) preserve the key (as well as decrypted data) in RAM while the computer is running with an implicit assumption that the memory is volatile and key will be lost along with decrypted data when…
Vikrant Chaudhary
- 113
- 4
1
vote
1 answer
Ciphertext for email vs Ciphertext for database
Let's say Bob wants to send a message to Alice. This communication requires to achieve confidentiality, integrity, proof of origin, non-repudiation. Therefore we can use this cipher-text:
ciphertext = KS[Message, Compress(Bob_PR[H(M)])],…
Best
- 133
- 1
- 7
0
votes
2 answers
future of graphical password authentication
I'm a student currently pursuing my Engineering in Computers. I'm planning to put all my knowledge in and try to actually implement something related to security.
To be more specific I'm more interested in graphical way to authenticate a person.…
noxious
- 19
- 3
0
votes
0 answers
How likely is it that publicly available data will be decrypted in the future?
As we already know, with the rising power of machines and new technologies like quantum computers today's methods of encryption might be much faster to crack in the future.
With locally saved data you could always safely erase it and write it again…
-3
votes
1 answer
For which time-frame should we assume quantum computers?
It is generally known that we choose our key-lengths, so they are unbreakable in a specific time frame. For example we choose 112 bit keys (=2048-bit RSA) to protect data for the next few years and we choose 128-bit keys for protection of data for…
SEJPM
- 9,500
- 5
- 35
- 66