frosty wrote:I hope you do, I find the whole thing fascinating to be honest.
Thanks! It's a fascinating field.
frosty wrote:From a systems administrator standpoint it extends past cryptography into the user space, so I'm interested in not just how weaknesses in the Crypto systems put networks and data at risk but also how you go about mitigating that problem, and furthermore how those mitigations change user behavior and how potentially bad user behavior can end up making the system weak for an entirely different reason.
I have a few thoughts on this that will become apparent in the next months. I've got some stuff I'd like to get written related to this.
frosty wrote:For example implementing strong password requirements such as len10+ with char requirements can cause users to adopt bad practices, write their passwords on postit notes, use common word chains (eg catdogelephant) which could be brute forced with a clever dictionary attack, and I even read a blog about keyboard walking and potentially creating a password list of all possible keyboard walking combinations which is interesting.
Word chains are an interesting problem to attack, and I have not yet written a dictionary cracker like this, but am seriously considering doing so. Keyboard patterns are total rubbish and are easily pwned by anyone with a moderate dictionary.
frosty wrote: guess you could say that from a crypto point of view that is solvable by simply moving from performance encryption to deliberately slower encryption which takes more CPU cycles and punishes brute force attacks, but in the real world right now I'm not convinced that's widely adopted.
It's not widely implemented, and it gives an attacker an easy way to DOS your site - just try a lot of logins.

frosty wrote:A talk on all of that would be super interesting.
I'll see what I can do!