Update page 'Home'

Russtopia 2018-10-10 22:29:47 -07:00
parent b43f022bf9
commit b3733c6711
1 changed files with 13 additions and 16 deletions

29
Home.md

@ -1,4 +1,4 @@
The HKExSh (Herradura Key Exchange Shell)
The HKExSh (HerraduraKyber Exchange Shell) (Originally HerraduraKEx Shell)
--
This project began as an excuse to
@ -23,6 +23,8 @@ one-shot command vs. interactive shell session and other session parameters) for
first published at
[Omar Elejandro Herrera Reyna's HerraduraKEx project](http://github.com/Caume/HerraduraKEx).
UPDATE: Now also can use the experimental Kyber IND-CCA2-secure key encapsulation mechanism (KEM)
The `hkexsh` client follows a standard Golang client connection style, but replaces
calls to raw `net.Dial()` with `hkex.Dial()`, and likewise the `hkexshd` server uses
`hkex.Listen()` to obtain connections conforming to the basic `net.Conn` interface.
@ -42,24 +44,19 @@ random size range, to help thwart analysis of the encrypted session (both its co
-----
*NOTE: Due to the experimental nature of the HerraduraKEx key exchange algorithm used to
derive crypto keying material, this algorithm and the demonstration remote
shell client/server programs should be used with caution and should definitely
NOT be used for any sensitive applications. USE AT YOUR OWN RISK.*
*NOTE: THIS PROJECT IS EXPERIMENTAL. Due to the experimental nature of the HerraduraKEx and Kyber IND-CCA-2 algorithms, this package SHOULD BE USED WITH CAUTION and should DEFINITELY NOT be used for any sensitive applications. USE AT YOUR OWN RISK. NO WARRANTY OR CLAIM OF FITNESS FOR PURPOSE IS IMPLIED.*
HERRADURA KEX
As of this time (Oct 2018) no verdict by acknowledged 'crypto experts' as to the level of security of the HerraduraKEx algorithm for purposes of session key exchange over an insecure channel has been rendered. It is hoped that experts in the field will analyze the algorithm and determine if it is indeed a suitable one for use in situations where Diffie-Hellman or other key exchange algorithms are currently utilized.
KYBER IND-CCA-2 KEM
As of this time (Oct 2018) Kyber is one of the candidate algorithms submitted to the NIST post-quantum cryptography project. The authors recommend using it in "... so-called hybrid mode in combination with established "pre-quantum" security; for example in combination with elliptic-curve Diffie-Hellman." THIS PROJECT DOES NOT DO THIS, for purposes of simplicity of code and to evaluate the algorithm in operation by itself (again, THIS PROJECT IS EXPERIMENTAL.)
-----
As of this time (Jan 2018) no verdict by acknowledged 'crypto experts' as to
the level of security of the HerraduraKEx algorithm for purposes of session
key exchange over an insecure channel has been rendered.
It is hoped that experts in the field will analyze the algorithm and
determine if it is indeed a suitable one for use in situations where
Diffie-Hellman or other key exchange algorithms are currently utilized.
The client and server programs are written in such a way that it should be possible to
extend or swap out the key agreement phase to use other algorithms, if HerraduraKEx is determined
to be insecure at some future time, or simply to expand support to other well-known
methods such as Diffie-Hellman.
The client and server programs are written in such a way that it is relatively simple to extend or swap out the key agreement phase to use other algorithms (for instance I was able to add KYBER768 as a second key exchange mechanism in a single evening.)
Finally, within the `hkexpasswd/` directory is a password-setting utility
using its own user/password file distinct from the system `/etc/passwd`, which