Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Encryption testing


  • Please log in to reply
4 replies to this topic

#1 KPLblackan

KPLblackan

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:07:16 AM

Posted 17 January 2017 - 08:05 AM

Hi!

We are three students working with encryption programs and we´re wondering if anyone knows any good methods on how to test whether the program is "good" or not. We would like to test our program in various areas like security, runtime etc. 
Thanks in advance!thumbsup.gif



BC AdBot (Login to Remove)

 


#2 Didier Stevens

Didier Stevens

  • BC Advisor
  • 2,672 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:08:16 AM

Posted 17 January 2017 - 05:12 PM

Are you talking about programs you wrote?


Didier Stevens
http://blog.DidierStevens.com
http://DidierStevensLabs.com

SANS ISC Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2018
MVP_Horizontal_BlueOnly.png

 

If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages.

 

Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0"


#3 KPLblackan

KPLblackan
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:07:16 AM

Posted 17 January 2017 - 05:18 PM

Yes, exactly. We´re looking for a method that we can use to test the encryption program we wrote.



#4 Didier Stevens

Didier Stevens

  • BC Advisor
  • 2,672 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:08:16 AM

Posted 17 January 2017 - 05:43 PM

And what encryption did you use?

 

Did you invent your own encryption method, are you using an existing crypto library, did you implement an existing cryptographic algorithm, ... ?


Didier Stevens
http://blog.DidierStevens.com
http://DidierStevensLabs.com

SANS ISC Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2018
MVP_Horizontal_BlueOnly.png

 

If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages.

 

Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0"


#5 Crazy Cat

Crazy Cat

  • Members
  • 808 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Lunatic Asylum
  • Local time:06:16 PM

Posted 17 January 2017 - 11:55 PM

This may help?

https://en.wikipedia.org/wiki/Homomorphic_encryption
https://www.ll.mit.edu/mission/cybersec/softwaretools/hetest/hetest.html
https://eprint.iacr.org/2015/416.pdf
https://crypto.stanford.edu/craig/craig-thesis.pdf
https://www.microsoft.com/en-us/research/project/homomorphic-encryption/
 

Two things are infinite: the universe and human stupidity; and I'm not sure about the universe. ― Albert Einstein ― Insanity is doing the same thing, over and over again, but expecting different results.

 

InternetDefenseLeague-footer-badge.png





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users