Author Archives: Rolf

How do Renegotiation and Triple Handshake Attacks work in TLS?

Both attacks refer to a man-in-the-middle (MITM) attacks, in which an adversary – acting as a MITM – tries to inject data before the client is properly authenticated. This data is then passed to the application together with the data … Continue reading

Posted in Uncategorized | Leave a comment

What is Salsa20 and ChaCha20?

Salsa20 is a new variable-round stream cipher developed by Dan Bernstein in 2005. It is used in many Internet applications as a replacement for RC4 that has been shown to have statistical defects. ChaCha20 is a modified version of Salsa20 … Continue reading

Posted in Uncategorized | 2 Comments

CALL FOR QUESTIONS

Please, leave your question as a comment to this post or e-mail it to cryptolog@esecurity.ch. In either case, your question is highly appreciated.

Posted in Uncategorized | Leave a comment