Commit message (Collapse) | Author | Age | |
---|---|---|---|
* | disable decryption puzzle, at least for now | Joey Hess | 2016-08-11 |
| | | | | | | | | It only adds 1 minute GPU time to each crack attempt, on top of the 10 minutes CPU time needed to argon2 the password. Since my implementation of the AES puzzle is currently really slow, this is not worth it. Will revisit when I have a faster AES library to use, or a better puzzle. | ||
* | don't use IV as puzzle after all | Joey Hess | 2016-08-11 |
| | | | | | | | | Not a good idea to use IV, because all the parts of the IV that are 0 will not obscure the data in the first block at all. Instead, sha256 the password to generate the IV, and keep the puzzle as part of the key. | ||
* | guessing puzzle answers | Joey Hess | 2016-08-11 |
| | |||
* | round-tripping now working, except for guessing the puzzle | Joey Hess | 2016-08-11 |
| | |||
* | simplify by using the IV as the puzzle | Joey Hess | 2016-08-11 |
| | |||
* | inline slightly modified version of secret-sharing | Joey Hess | 2016-08-11 |
| | | | | | Needed for efficient serialization of shares, unless upstream takes my suggestion to make the finite field be size 256. | ||
* | nearly able to generate shards now | Joey Hess | 2016-08-11 |
| | |||
* | reorg, and working on serialization | Joey Hess | 2016-08-07 |
| | |||
* | sharding | Joey Hess | 2016-08-07 |
| | |||
* | finish AES decryption puzzle implementation | Joey Hess | 2016-08-07 |
| | |||
* | aws spot instance attack cost estimate | Joey Hess | 2016-08-07 |
| | |||
* | more cost calculation and refactored Tunables | Joey Hess | 2016-08-06 |