1. 9
  1.  

  2. 2

    Great work! I was hoping someone tried to apply formal methods to Noise.

    1. 2

      Thanks, Nick! You can read more about the plan for Noise Explorer here: https://moderncrypto.org/mail-archive/noise/2019/001978.html

      1. 1

        I like most of that. Especially focusing on the Wireguard algorithms. One concern.

        I avoided GC-based languages in the past due to covert channels being harder to mitigate. How did you address constant-time programming for Go? Just turn off the GC with an inspection of assembly after?

        1. 2

          As far as I understand, the Go crypto engineering team is invested in producing a standard crypto library with side-channel resistant primitives.

    2. 2

      It would be great to make it possible for people to tag the patterns to actual software using them, so one can have some overview of what is being used by whom.

      1. 1

        This is a cool idea!

      2. 1

        Great presentation at RWC! Hopefully this gets to a point where people e.g. Dodis et al are contributing formalizations of e.g. message franking and it becomes this extensible choose-your-own-adventure protocol generation tool!