Libgcrypt 1.7.0 released

Libgcrypt is a general purpose cryptographic library based on the code from GnuPG. It provides functions for all cryptographic building blocks: symmetric ciphers, hash algorithms, MACs, public key algorithms, large integer functions, random numbers and a lot of supporting functions.

Version 1.7. has new algorithms and modes listed below:

– SHA3-224, SHA3-256, SHA3-384, SHA3-512, and MD2 hash algorithms.

– SHAKE128 and SHAKE256 extendable-output hash algorithms.

– ChaCha20 stream cipher.

– Poly1305 message authentication algorithm

– ChaCha20-Poly1305 Authenticated Encryption with Associated Data
mode.

– OCB mode.

– HMAC-MD2 for use by legacy applications.

* New curves for ECC:

– Curve25519.

– sec256k1.

– GOST R 34.10-2001 and GOST R 34.10-2012.

link

Encrypted Database provider zeroDB goes open source

ZeroDB is an end-to-end encrypted database. Data can be stored on untrusted database servers without ever exposing the encryption key. Clients can execute remote queries against the encrypted data without downloading all of it or suffering an excessive performance hit.

 

ZeroDB sources published at github.

ZeroDB-server sources

information about zerodb technology

 

Amazon introduces alternate TLS implementation s2n

s2n_logo

Amazon Web Services introduced s2n; an Open Source implementation of the TLS protocol.  s2n is a library that has been designed to be small, fast, with simplicity as a priority. s2n avoids implementing rarely used options and extensions, and today is just more than 6,000 lines of code. As a result of this, Amazon developers expected  that it is easier to review s2n; they have already completed three external security evaluations and penetration tests on s2n, a practice we will be continuing.

Link

Repo

 

 

Ukraine’s new encryption standart: The Kalyna Block Cipher

The Kalyna block cipher was selected during Ukrainian National Public Cryptographic Competition (2007-2010) and its slight modification was approved as the new encryption standard of Ukraine in 2015. Main requirements for Kalyna were both high security level and high performance of software implementation on general-purpose 64-bit CPUs. The cipher has SPN-based (Rijndael-like) structure with increased MDS matrix size, a new set of four different S-boxes, pre- and postwhitening using modulo 2^{64} addition and a new construction of the key schedule. Kalyna supports block size and key length of 128, 256 and 512 bits (key length can be either equal or double of the block size).

PDF