Thread 106131953 - /g/ [Archived: 416 hours ago]

Anonymous
8/4/2025, 1:27:33 AM No.106131953
BlockCipherModesofOperation.svg
BlockCipherModesofOperation.svg
md5: 6241a350b0c07ff40d97d742a669e71e🔍
What's the /g/ approved cipher mode of operation
Replies: >>106131973 >>106132125 >>106132228
Anonymous
8/4/2025, 1:30:23 AM No.106131973
>>106131953 (OP)
>nonce counter
Anonymous
8/4/2025, 1:51:40 AM No.106132125
BernsteinJ2x1
BernsteinJ2x1
md5: 4736260d4a276d0b62b2562b8b0a792f🔍
>>106131953 (OP)
Fuck AES, I prefer xChaCha20 (a stream cipher).
Replies: >>106133091
Anonymous
8/4/2025, 2:04:10 AM No.106132228
>>106131953 (OP)
>block cipher
ngmi
stream ciphers are where it's at
Replies: >>106134090
Anonymous
8/4/2025, 3:31:21 AM No.106132885
I can't find anyone implementing this.

Basically, a one time pad hard drive, and the other one is the ciphertext hard drive. Actually, the otp hdd can generate the random data on the fly. But anyway, instead of having any copies of the otp hdd, you just have one.

So really they are of equal meaning, since you only write to both drives at the same time during use.

I would call this raid -1. (raid negative one).

So, if you take either hdd with you, you basically have taken the key to the plaintext.

Except both are the key to the plaintext.

idk why this "RAID NEG ONE" isn't implemented, but it could be rather useful.

In case you're wondering, I this isn't meant to replace regular cryptography. You continue to use full disk encryption as usual, and you use well, not gpg, because web of trust is a total nsa rape, but symmetric ciphers.

Ideally we'd have a system of "chain of communications" where you have to alternate between persons, and this ping pong would work like this:
>an archive file is generated containing
>your stupid letter.txt
and
>the key you will use for your reply (very long and generated by the sender)

It could work over literally anything.

But anyway. bouncy privacy has yet to be implemented. And also RAID NEG ONE.
Replies: >>106132995 >>106133307
Anonymous
8/4/2025, 3:46:43 AM No.106132995
RAID NEG ONE
RAID NEG ONE
md5: 49ac0f5628d29b7912ab4a90c087a811🔍
>>106132885
Replies: >>106133077
Anonymous
8/4/2025, 4:01:08 AM No.106133077
BounceCrypt
BounceCrypt
md5: 52283baae4f0075ad1707e0326783790🔍
>>106132995
Anonymous
8/4/2025, 4:04:15 AM No.106133091
>>106132125
Someone should make the ChaCha-RS method.
Replies: >>106133162
Anonymous
8/4/2025, 4:15:31 AM No.106133162
>>106133091
What I want is RAID NEG ONE and BounceCrypt
Anonymous
8/4/2025, 4:38:14 AM No.106133307
retardcapsules
retardcapsules
md5: 86c5c0946a23df13fbbac049e97fe857🔍
>>106132885
>I can't find anyone implementing this.
because it's retarded
Not only is the encryption completely pointless, since if the feds are gonna raid you, anything you could do with one of the two drives you could have done with just one drive alone without encryption (I guess if they can only find one drive you're safe). Except now you have a RAID-0-like situation where if one drive fails, the data is completely irrecoverable (and not just practically but mathematically) but with half the data storage capacity.
Replies: >>106133405
Anonymous
8/4/2025, 4:50:57 AM No.106133405
>>106133307
we assume perfect drives (there are mitigations that are obvious, so I think you're retarded)

You're sperging out, but this is practically just like a keyfile.

Again, I think you are retarded, because obviously you use whatever other encryption you want, but this creates a very interesting scenario:

>you absolutely require physical control of two locations to get the data
>there is no alternative, except catching you at the moment of use/creation

Unlike a keyfile, this is perfect encryption.

I mean, given that it's perfect, it's wild nobody has done this.
Anonymous
8/4/2025, 5:04:57 AM No.106133479
GCM-Galois_Counter_Mode_with_IV.svg
GCM-Galois_Counter_Mode_with_IV.svg
md5: 3672e963effb730b52987b1723cc9152🔍
Replies: >>106133493 >>106133770
Anonymous
8/4/2025, 5:06:33 AM No.106133493
>>106133479
came here to say this
Anonymous
8/4/2025, 5:52:46 AM No.106133770
>>106133479
GCM Is CTR with some Galois thing to generate an authentication tag. Also max file size of 64GB.
Anonymous
8/4/2025, 6:54:02 AM No.106134090
>>106132228
What is the point of stream ciphers if you still have to frame packets