Friday, September 23, 2016

Here are speed benchmarks for some of the most commonly used cryptographic algorithms

Precomputation means using a table of 16 precomputed powers of each fixed base to speed up exponentiation.

https://www.cryptopp.com/benchmarks.html 

 

LTC1595 - Serial 16-Bit Multiplying DACs

Description

The LTC®1595/LTC1596/LTC1596-1 are serial input, 16‑bit multiplying current output DACs. The LTC1595 is pin and hardware compatible with the 12-bit DAC8043 and comes in 8-pin PDIP and SO packages. The LTC1596 is pin and hardware compatible with the 12-bit DAC8143/AD7543 and comes in the 16-pin SO wide package.
Both are specified over the industrial temperature range. Sensitivity of INL to op amp VOS is reduced by five times compared to the industry standard 12-bit DACs, so most systems can be easily upgraded to true 16-bit resolution and linearity without requiring more precise op amps.
These DACs include an internal deglitching circuit that reduces the glitch impulse by more than ten times to less than 1nV-s typ.
The DACs have a clear input and a power-on reset. The LTC1595 and LTC1596 reset to zero-scale. The LTC1596‑1 is a version of the LTC1596 that resets to mid-scale.

http://www.linear.com/product/LTC1595

SiTime's all-silicon MEMS resonators are at the core of SiTime's MEMS-based silicon oscillator and clock generator products. These extremely stable and ultra-robust resonators, based on SiTime’s groundbreaking TempFlat MEMS technology, are manufactured using standard CMOS process equipment in semiconductor fabs, using silicon on insulator (SOI) wafers. The resonators are vacuum-sealed in silicon and can be packaged in cost-effective plastic packages. More on how SiTime's resonators are manufactured.

https://www.sitime.com/technology/mems-resonators 


setClockDivider()

Description

This function should not be used in new projects. Use SPISettings with SPI.beginTransaction() to configure SPI parameters.
Sets the SPI clock divider relative to the system clock. On AVR based boards, the dividers available are 2, 4, 8, 16, 32, 64 or 128. The default setting is SPI_CLOCK_DIV4, which sets the SPI clock to one-quarter the frequency of the system clock (4 Mhz for the boards at 16 MHz).

https://www.arduino.cc/en/Reference/SPISetClockDivider


OpenPuff 4.00 - Yet not another steganography SW


flag_sa.png flag_bg.png flag_cz.png flag_de.png flag_uk.png flag_es.png flag_ir.png flag_fr.png flag_gr.png flag_hu.png flag_id.png flag_it.png flag_ja.png flag_kr.png flag_nl.png
flag_pl.png flag_pt.png flag_ro.png flag_ru.png flag_sk.png flag_th.png flag_tr.png flag_ua.png flag_vn.png flag_zh.png

zip.jpg OpenPuff CC-BY 4.0 / lambda.jpg Source Page / lambda.jpg Video Tutorials & Youtube

 

lambda.jpg Papers & Articles / lambda.jpg Thesis / lambda.jpg Lectures / lambda.jpg Web Reviews

 

MultiObfuscator.jpg Check for more: Hardware for Independent+Deniable+Cloud Data Hiding & Obfuscation MultiObfuscator.jpg


OpenPuff is a professional steganography tool:


  • HW seeded random number generator (CSPRNG)

  • Deniable steganography

  • Carrier chains (up to 256Mb of hidden data)

  • Carrier bits selection level

  • Modern multi-cryptography (16 algorithms)

  • Multi-layered data obfuscation (3 passwords)

  • X-squared steganalysis resistance


Unique layers of security and obfuscation:


  • 256bit+256bit symmetric-key cryptography (with KDF4 password extension)

  • 256bit symmetric-key data scrambling (CSPRNG-based shuffling)

  • 256bit symmetric-key data whitening (CSPRNG-based noise mixing)

  • Adaptive non-linear carrier bit encoding

     http://embeddedsw.net/OpenPuff_Steganography_Home.html

OpenPuff supports many carrier formats:


  • Images (BMP, JPG, PCX, PNG, TGA)

  • Audio support (AIFF, MP3, NEXT/SUN, WAV)

  • Video support (3GP, MP4, MPG, VOB)

  • Flash-Adobe support (FLV, SWF, PDF)


OpenPuff is a portable/stealth software:


  • Native portable structure (no installation, registry keys, .ini files)

  • Runs in user mode with DEP on

  • Multithread support (up to 16 CPUs) = Faster processing


OpenPuff is freeware:


  • Spyware/adware-free

  • Fully redistributable

  • OpenSource core crypto-library (libObfuscate)

"I found a tool called Yafu. It appears to be rather competent. It would require years of effort and advanced skills in math to write a better tool. For integers 320 bits and larger, Yafu requires GGNFS – a seriously very complicated piece of software that also hard to compile. Luckily there are nice windows binaries from Jeff Gilchrist. I also downloaded a binary version of Yafu for Windows. The examples below use Cygwin to have access to some Unix tools (bc, tr, openssl)."

http://techfindings.one/archives/1568 


Automated integer factorization 

  INSTALLATION --------------------------------------------------------------- No installation necessary, just put the binary in whatever location you like and run it. --------------------------------------------------------------- INSTALLATION WITH NFS SUPPORT --------------------------------------------------------------- To run the general or special number field sieve using yafu, you will need to provide ggnfs executable files and make the location of these files known to yafu at runtime. The easiest way to obtain the files is through Jeff Gilchrist's website: http://gilchrist.ca/jeff/factoring/index.html Download the .zip file for your OS and unzip it to a directory on your computer. The easiest way to let yafu know where these are is to modify your yafu.ini file (which should appear in the same directory as your yafu executable files) to contain a line specifying ggnfs_dir in the following way: ggnfs_dir= For instance, if your ggnfs executables were located adjacent to the yafu folder in the directory tree, in a folder called ggnfs-bin, then the line would be ggnfs_dir=..\ggnfs-bin\ --------------------------------------------------------------- PRE-COMPILED BINARIES --------------------------------------------------------------- Pre-compiled binaries have both GMP-ECM and selected msieve NFS routines built in (poly selection, linear algebra, and square root routines). For 32 bit windows, GMP-ECM 6.3 was linked against the MPIR-2.1.3 32 bit generic library. For 64 bit windows, GMP-ECM 6.3 was linked against the MPIR-2.1.3 64 bit core2 library. For 64 bit linux builds, GMP-ECM 6.3 was linked against GMP 5.0.1 x86_64 library. 32 bit linux builds currently are not provided All versions were linked against version 1.48 of msieve. --------------------------------------------------------------- BUILD INFORMATION --------------------------------------------------------------- Anyone is welcome to compile for your own system. If you can make a binary which beats the performance of one of the pre-compiled versions for a particular architecture, I'd love to hear about it!

Honeypot Tools


70015

Other Honeypot Tools

  • LaBrea Tarpit
  • PatriotBox
  • Kojoney
  • HoneyBOT
  • Google Hack Honeypot
  • WinHoneyd
  • HIHAT
  • Argos
  • Glastopf
  • Send-Safe Honeypot Hunter
http://exweeto.com/Security/Certified-Ethical-Hacker/CEH-v8?topic=Honeypot+Tools 
 
 
DEFENSE:
 
 

Repbin: Replicated Encrypted Paste Bin


Repbin is an encrypted pastebin for the command line that runs over Tor! Repbin servers form a distributed network where nodes sync posts with each other (like in Usenet or BBS/Fido systems). This makes Repbin resilient and scalable. Repbin focuses on privacy (encrypted messages) and anonymity (padding and repost chains). To limit spam and denial-of-service attacks, Repbin uses the Hashcash proof-of-work algorithm which is widely known from Bitcoin mining.

https://github.com/repbin/repbin 

Man in the Rain