Brute-force attack or exhaustive key search is a systematic way of checking all possible keys of an encryption system until the correct key is found. In this experiment, I am trying to analyse a weak PRG whose output can be predicted in roughly 2^28 time.This involves 2 python scripts,
– WeakPRG.py: With random seeds, each 28 bits, this algorithm will output 9 psuedo-random numbers.
– BreakPRG.py: This experiment will predict it’s 10th output in roughly 2^28 time.
I am having real fun with Cryptography :). Here I have shared my first experiment to understand the problem with using the same stream cypher key multiple times. There 2 python scripts,
– CypherText.py: This script will help you to generate keys and cypher texts
– CryptoUtils.py: This script will provide you tools and experiments to analyse the cypher.
Next couple of weeks I am going to experiment few basic techniques in cryptography to better understand “information security” – ie Confidentiality, Integrity and Availability! Probably I will more focus on Confidentiality and Integrity.
HC-05 is a low cost Bluetooth serial interface module targeting hobbyists and medium commercial applications. It makes it very easy to convert a serial port on your embedded hardware to a Bluetooth and go wireless. Time to go crazy with linux, bluez and /dev/rfcomm* :).
Here’s a function that you can use to kill all buffers, but which prevents some buffers to be killed by mistake.
;; You can modify that list, to fit your needs
(setq not-to-kill-buffer-list ‘(“*scratch*” “*Messages*” “.emacs”))
(defun kill-buffer-but-not-some ()
(if (member (buffer-name (current-buffer)) not-to-kill-buffer-list)
(mapc ‘kill-buffer (delq (current-buffer) (buffer-list)))
(global-set-key (kbd “C-c k”) ‘kill-buffer-but-not-some)
It was indeed a pleasant surprise this morning to see my name listed in ACE+TAO contributors :).
I must thank Vyasan and Dhruba, my previous project managers, for their immense support and encouragement during the conceptualization of a ACE+TAO based distributed infotainment software architecture. I had then prototyped a digital cluster based on this distributed object architecture.
Two Linux oriented non-profit groups, The LiMo Foundation and The Linux Foundation, have announced an open-source project called Tizen, intended to develop a mobile device software platform based on the Linux operating system. Read more here