Questions tagged [snake-oil-cryptography]

Snake oil cryptography is a term coined by Bruce Schneier to describe products that make fantastic claims about security through cryptography.

Snake oil cryptography is a term coined by Bruce Schneier to describe products that make fantastic claims about security through cryptography.

An example of such a product is a USB-stick claiming AES security while the AES encryption is performed in software running within the host and the key is retrieved directly from the memory of the device itself.

You can use this tag to ask about (proprietary) cryptographic algorithms that are present within such devices. This tag may be used for algorithms that are suspected of snake-oil cryptography, and/or are not documented well-enough to make their security claims falsifiable. It's not an accusation of insecurity.

7 questions
96
votes
4 answers

Has SHA256 been broken by Treadwell Stanton DuPont?

In a recent press release issued by Treadwell Stanton DuPont, the claim is made that their research laboratories have successfully broken all 64 rounds of the SHA256 hashing algorithm. They further claim that they achieved this milestone a year ago…
Gary
  • 873
  • 1
  • 6
  • 12
94
votes
8 answers

How is CipherCloud doing homomorphic encryption?

Much of the literature and latest papers suggest that homomorphic encryption is still not practical yet. How is CipherCloud able to achieve this? Does anyone have an idea? Their website does not provide much information about how their system works.
sashank
  • 6,234
  • 4
  • 36
  • 68
40
votes
9 answers

What's the truth about this "absolutely unbreakable" cipher?

A story appeared on Forbes today claiming that we now have an absolutely unbreakable cipher. It cites a paper published in Nature Communications. However, I'm skeptical: But what if there were a method of enabling data to be sent using an…
10
votes
3 answers

1 Billion Bit Encryption?

So, browsing through YouTube, I stumbled on this video interview of John Draper (Captain Crunch), one of the first "hackers". He talks for about 3 minutes (until 27:48) about his home rolled encryption method that will use 1 billion bit keys that…
Tanner
  • 111
  • 4
3
votes
2 answers

What is the efficiency of the new Crown Sterling semiprime factoring method?

In their press release a company called Crown Sterling describes they are working a paper that includes four different geometric and arithmetic methods for public key (semiprime) factorization and one of the methods titled, “The Reciprocal…
maqp
  • 61
  • 4
3
votes
0 answers

Cryptography behind the Turing Imitation Key (TIK)

When browsing the internet I found out about this amazing phone. Well, it would be amazing if it was actually obtainable. It's called the Turing Phone, and it is supposed to come with as good as unbreakable…
Maarten Bodewes
  • 96,351
  • 14
  • 169
  • 323
2
votes
2 answers

What is the mainstream cryptography?

I am always hearing the term "mainstream cryptography", I am looking forward to more clarification on this concept. What I the mainstream cryptography? Is its definition subjective? Is symmetric cryptography within the mainstream cryptography? Are…
Crypt01
  • 427
  • 3
  • 11