Byte Cache

Table of Contents

Welcome!

This computing and security blog is intended to:
- serve as documentation for my own reference.
- help others that may be looking for such information.
- gain valuable feedback from the community for my own edification.

Bare-Metal Environment

Because there is no cloud, I choose to document my bare-metal environment. Of course, it includes distributed components, such as Docker containers in Kubernetes workers. Following is a UML diagram describing my environment. Bare-metal configurations are included for components with larger font. Very much a work in progress.

Sorry, your browser does not support SVG.

Labs

Layered network lab specification suitable for performing security research using VMware Workstation Pro on a Debian workstation.

Cryptanalysis

Rigorous analysis on cryptographic systems typically requires reviewing each primitive in isolation. When assessing these cryptographic primitives, generally the scientific method is as follows:

  • Specify the thread model: What can an attacker do to attack the cryptographic primitive?
  • Propose secure construction for primitive.
  • Prove an attack which compromises the construction under the threat model also solves a difficult underlying problem (e.g., factoring primes from a large product).

Such analysis provides a statistical proof of security.

The following UML describes classes of cryptographic primitives, and provides links to my analyses where there is larger font.

Sorry, your browser does not support SVG.

Last Modified: 2019-12-06 Fri 20:18

Built with Emacs 26.1 (Org mode 9.1.9)




Homepage
 | 
Contact Me
 | 
Git Repos
🔑 PGP Key