Questions tagged [cryptographic-hardware]
Cryptographic hardware enables the handling of cryptographic tasks and/or problems using hardware instead of software solutions.
154 questions
5
votes
1
answer
295
views
Strength of AES when 32-bits of the 128-bit key are known?
This could be related to any cipher, but this is specific so some AES hardware. In this hardware, a 128-bit random number is exchanged, as one does, between hosts. Due to a hardware quirk, the last ...
3
votes
2
answers
337
views
Value of HSM in Cloud
I'm working in an insurance company. Beyond meeting regulatory compliance requirements, is there really any need to enforce hsm in Azure Key Vault (premium tier). The risk of exposure seems ...
1
vote
1
answer
85
views
Implementing a Kubernetes KMS with a Relatively-Limited HSM
I would like to implement an HSM-backed KMS server for Kubernetes secrets and Talos Linux disk encryption keys for use in my homelab. I have a SmartCard-HSM EA+ for this purpose. Because of the ...
1
vote
1
answer
89
views
Hardware Reverse Engineering FPGA LUTs for AES Analysis
I've been reading up on hardware reverse engineering, specifically in the context of FPGAs and how one might retrieve critical information like the contents of Lookup Tables (LUTs).
After ...
2
votes
0
answers
97
views
What's the current state of password bruteforcing ASICs in relation to memory hard key derivation functions?
Even though this sounds hardware related, it's essential to understand the actual security one obtains from memory hard key derivation functions, such as Balloon, as its strongest security guarantee ...
2
votes
0
answers
48
views
HSM clarification
I need to buy an HSM for a project (need it for compliance with government regulations) and I am kind of confused. Price range is really wide. I can see used THALES nCipher HSMs on eBay for as low as ...
1
vote
0
answers
222
views
Updated SHA256 for tree hashing (SHA-NI acceleration) [closed]
SHA-256 has been allocated silicon on modern CPU's (SHA-NI).
256-bit hash space is considered secure even against CRQC (Cryptographically Relevant Quantum Computers).
Accelerated SHA-256 outperforms ...
1
vote
0
answers
195
views
Yubikey/GPG Ed25519 signing without knowledge of the public key
Lets assume the following scenario:
We have an Ed25519 secret key generated on a hardware device (like a Yubikey). Lets assume it is protected by the device and cannot be exported. The device can - in ...
0
votes
0
answers
29
views
For JCrypt LFSR Stream Cipher Utilization, is it Possible to Have Registers of n>15?
I'm performing theory and technical research on reversing the logic output of an old, decaying and fragile arcade board IC that utilizes LFSRs in order to generate multiple randomized star-field ...
1
vote
1
answer
157
views
Does fetching the time in a loop generate secure random numbers?
Rust doesn't have a random number generator in the standard library, so I've been experimenting with creating my own random() function. One simple option would just ...
1
vote
1
answer
117
views
What is the XOR count of AES MixColumn matrix?
I am a beginner and I am learning about XOR counts, (Link to background: https://ia.cr/2014/530).
The 4 by 4 matrix used in the MixColumn operation in AES is [2,3,1,1],[1,2,3,1],[1,1,2,3],[3,1,1,2]. I ...
0
votes
0
answers
40
views
In the context of Hardware Security and Cryptography, how do I calculate the Algebraic Normal Form for sboxes [duplicate]
In our hardware security exercise, I am trying to calculate the ANF function manually (Sboxes) for the given table:
And I came up with the result as:
I thought I was calculating it correctly using ...
1
vote
0
answers
85
views
I do not understand the result of 'proposition 2' of "MDx-MAC and building fast MACs from hash functions"
I saw the difference between the proof and the statement of "proposition 2" in the paper "MDx-MAC and building fast MACs from hash functions" by Bart Preneel & Paul C. van ...
0
votes
0
answers
74
views
High throughput authentication on ARMv8
I am working on a project where I need to authenticate data in parallel with computations on that data. The idea is to stream data from memory onto the chip only once; while the data is on-chip, we do ...
3
votes
1
answer
282
views
RSA/ ECC keygen HW vs SW
i have a pretty straightforward question but i can’t seem to find an answer :
Regardless of the physical protection provided by an HSM or TPM or any hardware cryptographic key storage system, are keys ...