Tag Archives: encryption

Command Line Fu: surveillance with Raspberry Pi

Today we are building the a primitive surveillance system using a Raspberry Pi. This is our goal: Take a picture every hour -> send it as encrypted email These are the basic prerequisites: A Raspberry Pi, no matter which model. … Continue reading

Posted in Encryption, Security/Encryption | Tagged , , , , , , , , | Leave a comment

Quick tip: Veracrypt on a Raspberry Pi 2 [update: Veracrypt 1.18]

My recent blog post seems to be somewhat outdated. Here is an update to install Veracrypt 1.18 on a raspberry 2 with OS Raspbian GNU/Linux 8 kernel 4.4.13. First one needs to install We assume that you downloaded VeraCrypt_1.18_Source.tar.bz2 into … Continue reading

Posted in Encryption, Security, Security/Encryption | Tagged , | 4 Comments

Quick tip: Veracrypt on a Raspberry Pi 2

As a long-year user of Truecrypt, whenever I set up a new system, Truecrypt has been among the first pieces of Software that I install. By the time I acquired the new Raspberry 2, I was willing to give Veracrypt … Continue reading

Posted in Encryption, Security, Security/Encryption | Tagged , | 6 Comments

How to get a job with 250 lines of code

Recently, I stumbled upon a cryptographic challenge posed by a company called “Trustpilot”. The problem was available at http://followthewhiterabbit.trustpilot.com/challenge2.html. For completeness I post a screenshot here: Let that sink for a little while. Generously, the key has only six unknowns, … Continue reading

Posted in Encryption, Programming, Security/Encryption | Tagged , , , , , | 1 Comment

The RC4 stream cipher

Today I will continue my crypto-101 series with the very popular stream cipher RC4 (Ron’s code 4 by Ronald L. Rivest). I want to say at the very beginning that RC4 is not regarded as secure anymore as by today’s … Continue reading

Posted in Encryption, Programming, Security | Tagged , , , , , , , , | Leave a comment

Block mode of operation: why ECB is bad

In an earlier post I discussed how AES works on small 128 bit blocks of plaintext. Your usual data will generally be larger than that. First, as a rule, you will have to fill up your plaintext such that its … Continue reading

Posted in Encryption, Mathematica | Tagged , , , , | 3 Comments

AES in Mathematica

Disclaimer I: The following code is for educational purposes only. Its sole function is to show how the AES algorithm works. It is not by any means intended for real life applications. Do not use it to encrypt your personal … Continue reading

Posted in Encryption, Mathematica | Tagged , , , | 2 Comments