
Recent
 Command Line Fu: surveillance with Raspberry Pi
 Let gooby do teh hoemwerk: Riemann zeta at two
 Mathematical insult gone awry
 How to get a job with 70 lines of code
 Quick tip: Veracrypt on a Raspberry Pi 2 [update: Veracrypt 1.18]
 Java bean differences
 Pade approximants: a case study (iii)
 Pade approximants: a case study (ii)
 Pade approximants: a case study (i)
 Setting up i2p running in a docker container
 Apache commonscollections vulnerability – try it at home
 Movember ’15
 Let gooby do teh hoemwerk: Green function of the twodimensional Laplace operator
 Let gooby do teh hoemwerk: BakerCampbellHausdorff identities
 Mocking Spring Data repositories
 Job application title page
 Let gooby do teh hoemwerk: SokhatskyWeierstrass identity
 Let gooby do teh hoemwerk: Riemann zeta at minus one
 TLS/SSL certificate exchange in Java
 Quick tip: Veracrypt on a Raspberry Pi 2
 Who am I?
 Guess who?
 How to get a job with 250 lines of code
 Joke’s on me I guess
 Random Java objects for testing
 My conky config
 Quick tip: changing the userbase directory in Mathematica (Linux)
 Create your own Sudoku book
 The RC4 stream cipher
 Life hack: attaching a ferro rod to the Mora plastic sheath
 The Fappening
 A hash function primer II: CRC
 A hash function primer I: SHA1
 Creating a password list for WPA/WPA2 dictionary attacks
 Ulam’s spiral in Mathematica
 Block mode of operation: why ECB is bad
 AES in Mathematica
 Strong passwords from /dev/random
Archive
 January 2017
 November 2016
 October 2016
 September 2016
 April 2016
 March 2016
 February 2016
 January 2016
 December 2015
 November 2015
 October 2015
 September 2015
 August 2015
 July 2015
 June 2015
 May 2015
 April 2015
 March 2015
 February 2015
 January 2015
 December 2014
 November 2014
 October 2014
 September 2014
 July 2014
 June 2014
Monthly Archives: June 2014
Ulam’s spiral in Mathematica
Today we’re having a little fun with Mathematica. We will generate a visualization of the Ulam spiral. To this end the natural numbers are arranged in a spiral pattern, 37 36 35 34 33 32 31 38 17 16 15 … Continue reading
Block mode of operation: why ECB is bad
In an earlier post I discussed how AES works on small 128 bit blocks of plaintext. Your usual data will generally be larger than that. First, as a rule, you will have to fill up your plaintext such that its … Continue reading
Posted in Encryption, Mathematica
Tagged AES, block cipher, encryption, Mathematica, mode of operation
3 Comments
AES in Mathematica
Disclaimer I: The following code is for educational purposes only. Its sole function is to show how the AES algorithm works. It is not by any means intended for real life applications. Do not use it to encrypt your personal … Continue reading
Strong passwords from /dev/random
The most secure passwords are, roughly speaking, long and random sequences that cannot be cracked by means of dictionary or bruteforce attacks. This assumes of course, that the passwords are stored in a reasonable way, but that is typically not … Continue reading
Posted in Passwords, Security
Tagged bash, cli, dev/random, Linux, password, password advice, password generation, random, security
4 Comments