TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Where to ask for feedback about a cryptography related tool

8 pointsby ciprian_craciunover 3 years ago
First of all I know that &quot;implementing your own cryptography is bad&quot;. However, at some point, one does stumble upon a use-case that is not (well) covered by existing tools.<p>Now, assuming one has already done his due-diligence and has read (and hopefully understood at least the main ideas of) cryptography related RFC&#x27;s &#x2F; papers &#x2F; articles &#x2F; posts &#x2F; etc. (especially in the area pertaining to what one wants to build), and thus we can assume one is not a complete newbie in this mater, however, nor is he an expert. Basically we can assume he is an &quot;amateur&quot;.<p>Where would one go with his design to ask for feedback about it, in the hope to at least eliminate some weaknesses that one (as a non expert) might have overlooked. (I&#x27;m not speaking here about &quot;proofs&quot; or &quot;audits&quot;.)<p>----<p>More specifically ---- but please let&#x27;s not get into this right now, this being just an example ---- I&#x27;m trying to implement something similar to `scrypt` (the encryption utility, that uses the `scrypt` PBKDF, &lt;https:&#x2F;&#x2F;github.com&#x2F;Tarsnap&#x2F;scrypt&gt;) or `age` (&lt;https:&#x2F;&#x2F;github.com&#x2F;FiloSottile&#x2F;age&gt;), as a replacement to my current solution that relies on GnuPG.

4 comments

58x14over 3 years ago
It&#x27;s been my experience that most people, including those experienced, qualified, &amp;&#x2F;or published, are generally receptive to cold emails within their field(s) of work or interest.<p>My format is typically a ~3 line email: first, I mention how I came across them, which is often &quot;I was reading __ and saw your comment,&quot; and usually where I found their contact info. Next, I intersect my work with theirs; in the case of comments, often that is already contextual &quot;you mentioned X and Y, and I&#x27;m working on Y and Z.&quot; Last, I&#x27;ll present a simple structure of what I&#x27;m trying to learn, how I think they could help, and ask if they&#x27;re interested. In your case that could read something like &quot;I&#x27;m looking for a critical review of my design, because I might have missed something obvious. Would you be interested in helping? I think {small amount of time} would really keep me in the right direction. We could {preferred communication method, like video call} or {alternative communication method, &#x27;or I can email you the design&#x27;}&quot;<p>I consistently receive replies from &gt;80% and more than half of those conversations yield incredible value to my efforts. These days, I like to offer some form of compensation in my cold contact, out of respect and for efficiency, but it&#x27;s not required. Often this gesture is welcomed but unnecessary!<p>Being thoughtful, curious, and organized in your outreach are the key components for this strategy. Best of luck!
cweagansover 3 years ago
IMO, &quot;don&#x27;t implement your own crypto&quot; is more about the bits that actually _do_ the encryption. Use a battle tested library for that (e.g. libsodium). Wiring it up is a little different. You can misuse a library, but it&#x27;s a lot easier for some random person to point out how you&#x27;re misusing a library than it is for them to e.g. prove that you reimplemented some KDF correctly.
ciprian_craciunover 3 years ago
A few years ago I used to follow a few mailing lists about this topic, and as a last resort I think I&#x27;ll send an email there with my design:<p>* boring-crypto@list.cr.yp.to<p>* cryptography@metzdowd.com<p>* cryptography@randombit.net<p>* crypto@securityfocus.com<p>* cypherpunks@cpunks.org
high_byteover 3 years ago
you shouldn&#x27;t use your own crypto, but that doesn&#x27;t mean you shouldn&#x27;t do it! :)<p>just like any product it should be reviewed by security experts of their respective field, for you - cryptography experts. if it is based on some new mathematical concepts then perhaps you need a whitepaper and have it peer-reviewed. otherwise pay for a security audit.
评论 #29413391 未加载