% This section was authored by Ralf Schlatterbeck (Ralf Schlatterbeck <rsc@runtux.com>)
-\epigraph{``The generation of random numbers is too important to be left to chance.''}{-- Robert R. Coveyou}
+\epigraph{``The generation of random numbers is too important to be left to chance.''}{Robert R. Coveyou}
A good source of random numbers is essential for many crypto
operations. The key feature of a good random number generator is the
\vskip 2em
-\epigraph{``Unfortunately, the computer security and cryptology communities have drifted apart over the last 25 years. Security people don't always understand the available crypto tools, and crypto people don't always understand the real-world problems.''}{-- Ross Anderson in \cite{anderson2008security}}
+\epigraph{``Unfortunately, the computer security and cryptology communities have drifted apart over the last 25 years. Security people don't always understand the available crypto tools, and crypto people don't always understand the real-world problems.''}{Ross Anderson in \cite{anderson2008security}}
\vskip 2em
\setlength\epigraphwidth{8cm}
\setlength\epigraphrule{0pt}
\usepackage{etoolbox}
+\providecommand{\epitextfont}{\itshape}
+\providecommand{\episourcefont}{}
\makeatletter
-\patchcmd{\epigraph}{\@epitext{#1}}{\itshape\@epitext{#1}}{}{}
+\patchcmd{\@epitext}{#1}{{\epitextfont #1}}{}{}
+\patchcmd{\@episource}{#1}{{\episourcefont --- #1}}{}{}
\makeatother
\input{practical_settings}
%%
\chapter{Theory}
-%\epigraph{``Number theorists are like lotus-eaters - having tasted this food they can never give it up.''}{-- Leopold Kronecker}
+%\epigraph{``Number theorists are like lotus-eaters - having tasted this food they can never give it up.''}{Leopold Kronecker}
\label{chapter:Theory}
\input{theory}
\chapter{Appendix}
\section{Disclaimer and scope}
\label{section:disclaimer}
-\epigraph{``A chain is no stronger than its weakest link, and life is after all a chain''}{-- William James}
+\epigraph{``A chain is no stronger than its weakest link, and life is after all a chain''}{William James}
\epigraph{``Encryption works. Properly implemented strong crypto systems are
one of the few things that you can rely on. Unfortunately, endpoint security is
-so terrifically weak that NSA can frequently find ways around it.''}{-- Edward
+so terrifically weak that NSA can frequently find ways around it.''}{Edward
Snowden, answering questions live on the Guardian's
website\cite{snowdenGuardianGreenwald}}
\vskip 0.5em
-\epigraph{``Security is a process, not a product.''}{-- Bruce Schneier}
+\epigraph{``Security is a process, not a product.''}{Bruce Schneier}
This guide can only describe what the authors currently
\emph{believe} to be the best settings based on their personal experience and
\section{Methods}
\label{section:Methods}
-\epigraph{``C.O.S.H.E.R - completely open source, headers, engineering and research}{-- A. Kaplan's mail signature for many years}
+\epigraph{``C.O.S.H.E.R - completely open source, headers, engineering and research}{A. Kaplan's mail signature for many years}
% proof: http://www.mavetju.org/mail/view_message.php?list=freebsd-current&id=947899&raw=yes
\begin{figure}[H]
% move this epigraph to a fitting place. I don't see why it fits here inside of the begin figure env. ~~ AK
%\epigraph{``[...] be conservative in what you do, be liberal in what
-%you accept from others.''}{-- The robustness priciple or "Postel's Law"\cite{rfc761}}
+%you accept from others.''}{The robustness priciple or "Postel's Law"\cite{rfc761}}
\centering
\includegraphics[width=0.9\textwidth]{neboltai.png}
\caption*{Do not talk unencrypted}
\section{A note on Elliptic Curve Cryptography}
\label{section:EllipticCurveCryptography}
-%\epigraph{``Mathematics is the queen of the sciences and number theory is the queen of mathematics.''}{-- Carl Friedrich Gauss}
+%\epigraph{``Mathematics is the queen of the sciences and number theory is the queen of mathematics.''}{Carl Friedrich Gauss}
\epigraph{``Everyone knows what a curve is, until he has studied enough
mathematics to become confused through the countless number of possible
-exceptions.''}{-- Felix Klein }
+exceptions.''}{Felix Klein }
Elliptic Curve Cryptography (simply called ECC from now on) is a branch of
cryptography that emerged in the mid-1980s. The security of the RSA
% This section was authored by Ralf Schlatterbeck (Ralf Schlatterbeck <rsc@runtux.com>)
-\epigraph{``The generation of random numbers is too important to be left to chance.''}{-- Robert R. Coveyou}
+\epigraph{``The generation of random numbers is too important to be left to chance.''}{Robert R. Coveyou}
\begin{figure}[h]
\epigraph{``On the choice between AES256 and AES128: I would never consider
using AES256, just like I don't wear a helmet when I sit inside my car. It's
-too much bother for the epsilon improvement in security.''}{-- Vincent Rijmen
+too much bother for the epsilon improvement in security.''}{Vincent Rijmen
in a personal mail exchange Dec 2013}
Recommendations on keylengths need to be adapted regularly. Since this document
\label{sec:TheoryOverview}
-\epigraph{``The balance between freedom and security is a delicate one.''}{-- Mark Udall, american politician}
+\epigraph{``The balance between freedom and security is a delicate one.''}{Mark Udall, american politician}
This chapter provides the necessary background information on why chapter \ref{chapter:PracticalSettings} recommended \textit{cipher string B}.