Jump to content
Frequently Asked Questions
  • Are you not able to open the client? Try following our getting started guide
  • Still not working? Try downloading and running JarFix
  • Help! My bot doesn't do anything! Enable fresh start in client settings and restart the client
  • How to purchase with PayPal/OSRS/Crypto gold? You can purchase vouchers from other users
  • Cryptology / Cryptanalysis


    Banker

    Recommended Posts

    Hey so not sure where to put this so ill just put it here...

     

     

    Is anyone aware of any cryptology forums (not StackExchange) or anywhere where I can go and learn as much as possible about cryptology and cryptanalysis in general.

     

    I have purchased multiple books on the subject but not many of the modern methods are published, they mostly centre around Caesar ciphers and other basic ones.

     

    I am wanting to learn from the very basics (general substitution, shifting etc) up to very high levels of it, and connect with people also highly interested in the subject of it. 

     

    Any help is appreciated, thanks :)

     

    ~ Banker :bank:

    Link to comment
    Share on other sites

    *nJwIoDMnCwOoLG)7mU.<Kw5aUuUQ~EwO}Ma}@wNsJzQpm[$

     

    have fun figuring out how it works if you really want to, wrote this for class (thats why its german) and got best grade :otter:

    5190c7a2157a204dc8d92a1cc9a889e8.png

     

     

    Uhhhhh, well its not a simple cipher lol...

    Doubt ill be able to xD

     

    thanks anyways

    Link to comment
    Share on other sites

    • 1 month later...

    I don't know your background/expertise with cryptography so I hope I can be of help :)


    What is your general background with Mathematics?


    Do you have any background in field theory? AES encryption is something to look into

    Like number theory? RSA & ElGamal are great

    Something like this is a cool exercise in RSA:
     http://etutorials.org/Programming/secure+programming/Chapter+7.+Public+Key+Cryptography/7.10+Performing+Raw+Encryption+with+an+RSA+Public+Key

    Check out the following powerpoint for RSA: 
    https://crypto.stanford.edu/~dabo/courses/cs255_winter04/RSA-lecture.ppt

    When considering attacks on RSA, start with Weiner's attack and the proof for it. There are so many attacks on RSA but it takes quite a bit of digging to find them. 


    My understanding is that the newest developments in cryptography come from elliptic curve cryptography, but the barrier-of-entry is very high. 

    Graduate-level cryptography classes seem will generally use this text:
    https://www.amazon.com/Elliptic-Curves-Cryptography-Mathematics-Applications/dp/1420071467/ref=sr_1_1?ie=UTF8&qid=1489248636&sr=8-1&keywords=elliptic+curve+cryptography 

    If you do have time, look into how RSA & ElGamal are implemented in the "real world" (padding, primality tests when picking primes, how we use them to transmit keys, etc.)

    Textbooks will do a great job explaining the underlying concepts (Factoring is computationally hard, the discrete log problem is computationlly hard). Maybe look into shor's algorithm and the implications of theoretical models of computing on current cryptographic practices? 

    There's a huge distinction made between "textbook cryptography" and 'real-word' crypto as I'm sure we're all aware of :(. It's incredibly dangerous to implement and use any of the cryptographic principles discussed in textbooks in the real world, because there are thousands of obscure edge cases and considerations that leave us open for attacks/vulnerabilities, that, while generally public/"open-sourced", are so high-level and abstract, and tend to be understood by very few, that they won't be mentioned outside of PhD-level papers 




     

    Link to comment
    Share on other sites

    Archived

    This topic is now archived and is closed to further replies.

    ×
    ×
    • Create New...

    Important Information

    We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.