Informatics

twisted 2-step verification TOTP script

TOTP (Time-based One-Time Password) is commonly used to grant access to internet resources in addition to common user and password. TOTP is used primarily with Google Authenticator mobile app. But the algorithm can be easily implemented. All that is needed is the key provided by the internet resource we want to access to. Only using … Continue reading

Informatics

statistics circle for analysing byte entropy in files

In a previous post I introduced triops, a multiplatform cmdline encryption tool using CHACHA20 algorithm. In general, any encryption algorithm should produce a reasonably high entropic output no matter the input (plain text) at hand — this is in order to be aligned with concepts like Entropic security and Semantic security, very important in modern … Continue reading

Informatics

triops: a multiplatform cmdline encryption tool using CHACHA + KECCAK

I’ve developed in C a simple command line tool for encryption/decryption of files, which I have named triops. It uses CHACHA20 as algorithm for encryption/decryption and KECCAK-512 as hash algorithm. Source code is available at github. Check github for latest changes! Executables for some platforms (linux, Windows, HP-UX, Solaris, and Android) are available here. For … Continue reading