Daily Links Tuesday 12/29/15

Published or updated here:

Tracking U.S. Government HTTPS Progress

The United States federal government mandated that all publicly accessible federal websites and web services use a secure connection by December 31, 2016.  This page tracks the progress of federal government’s progress.

Link to current data on Pulse HTTPS the government’s public dashboard.

HTTPS Summary Timeline (only Top-level % Changes)

  • May 29, 2015 – 31% – contains logic bug
  • June 7, 2015 – 27% –  corrected for logic bug
  • June 13, 2015 – 28%
  • July 24, 2015 – 29%
  • August 14, 2015 – 30%
  • September 4, 2015 – 31%
  • September 18, 2015 – 32%
  • October 16, 2015 – 33%
  • December 4, 2015 – 34%
  • December 10, 2015 – 35%
  • December 18, 2015 – 36%
  • January 8, 2016 – 37%
  • January 15, 2016 – 38%
  • January 23, 2016 – 39%

Full Timeline of HTTPS Progress

  • May 29, 2015 – 31% –  contains logic bug
  • June 7, 2015 – 27% –  corrected for logic bug
  • June 13, 2015 – 28%
  • June 19, 2015 – 28%
  • June 26, 2015 – 28%
  • July 3, 2015 – 28%
  • July 10, 2015 – 28%
  • July 17, 2015 – 28%
  • July 24, 2015 – 29%
  • July 31, 2015 – 29%
  • August 7, 2015 – 29%
  • August 14, 2015 – 30%
  • August 21, 2015 – 30%
  • August 28, 2015 – 30%
  • September 4, 2015 – 31%
  • September 11, 2015 – 31%
  • September 18, 2015 – 32%
  • October 9, 2015 – 32%
  • October 16, 2015 – 33%
  • October 22, 2015 – 33%
  • October 30, 2015 – 33%
  • November 6, 2015 -33%
  • November 13, 2015 – 33%
  • November 28, 2015 – 33%
  • December 4, 2015 – 34%
  • December 10, 2015 – 35%
  • December 18, 2015 – 36%
  • December 26, 2015 – 36%
  • January 2, 2016 – 36%
  • January 8, 2016 – 37%
  • January 15, 2016 – 38%
  • January 23, 2016 – 39%
  • Mandate: December 31, 2016 – 100%

Source: 18F Pulse data updates on GitHub

Logic Bug info: Bad bug with logic around bad certificate chains

License

Content on this page is available under a Creative Commons Attribution 3.0 Unported License (CC BY 3.0)
https://creativecommons.org/licenses/by/3.0/.  In other words, share generously but provide attribution.

Python Quick Reference from Create Daily Links Text

Month List: index starts at 1

compatible with datetime module date.month

monthList[0] is an empty string

 

Weekday List:  index starts at 0

compatible with datetime module date.weekday()

Using isoweekday()? get the list here

 

Python String Lowercase

use “.lower()” example dayName.lower()

 

Python String Replace

str.replace(old, new[, max])

str.replace(” “,”-“)

 

Python String  Range Slice (Trim)

 

Python datetime double digit month and day values

 

Python Print Newline

2015’s big leap into machine learning

A few decades ago, artificial intelligence was just an exciting topic among engineers and developers. In recent years, machine learning has emerged as the ideal outgrowth of big data, breathing new life into concepts such as artificial intelligence. This is how machine learning changed our lives this year and how we expect these advances to impact… Continue reading 2015’s big leap into machine learning

Cryptography Acronyms / Abbreviations / Portmanteaus

Acronym / Abbreviation / Portmanteau Meaning
3DES Triple Data Encryption Standard
AE Authenticated Encryption
AEAD Authenticated Encryption with Associated Data
AES Advanced Encryption Standard
ALPN Application-Layer Protocol Negotiation
ANSI American National Standards Institute
BEAST Browser Exploit Against SSL/TLS
CBC Cipher Block Chaining
CCM Counter with CBC-MAC
CCMP CTR mode with CBC-MAC Protocol
CFB Cipher Feedback
CMAC Cipher-based Message Authentication Code
CMC CBC-mask-CBC
CRC Cyclic Redundancy Ccheck
CRL Certificate Revocation List
CTR Counter
CWC Carter-Wegman + CTR mode
DEC DECypt
DES Data Encryption Standard
EAP Extensible Authentication Protocol
EAX
ECB Electronic Codebook
ECC Elliptic Curve Cryptography
EME ECB-mask-ECB
ENC ENCrypt
ESSIV Encrypted salt-sector initialization vector
FDE Full Disk Encryption
FIPS Federal Information Processing Standard
GCM Galois/Counter Mode
GHASH Galois HASH
GMAC
GTK Group Temporal Key
HMAC keyed-Hash Message Authentication Code
HTTPS Hyper Text Transfer Protocol Secure
IAPM Integrity Aware Parallelizable Mode
ICM Integer Counter Mode
IDEA International Data Encryption Algorithm
IEC International Electrotechnical Commission
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IETF Internet Engineering Task Force
ISO International Organization for Standardization
IV Initialization Vector
KEK Key Encryption Key
KPK Key Production Key
KSA Key-scheduling algorithm
LFSR Linear feedback shift register
LRW Liskov, Rivest, and Wagner
LSB Least Significant Bit
MAC Message Authentication Code
MD Message Digest
MD5 Message Digest 5
MD-MITM Multi Dimensional-Meet In The Middle
MEK Message Encryption Key
MITM Meet In The Middle
MITM Man In The Middle
MPDU MAC Protocol Data Unit
MSB Most Significant Bit
NIST National Institute of Standards and Technology
NOMORE Numerous Occurrence MOnitoring & Recovery Exploit
NPN Next Protocol Negotiation
OCB Offset CodeBook
OFB Output Feedback
OMAC One-key MAC
OTP One-Time Pad
PCBC Propagating Cipher Block Chaining
PGP Pretty Good Privacy
PIN Personal Identification Number
PKC Public Key Cryptography
PKCS Public Key Cryptography Standards
PKI Public Key Infrastructure
PKIX Public Key Infrastructure X.509
PMAC Parallelizable MAC
PPK PuTTY Private Key
PRG Pseudo-random generator
PRGA Pseudo-random generation algorithm
RC4 Rivest Cipher 4
RFC Request For Comments
RSA Rivest, Shamir, Adleman
SHA Secure Hash Algorithm
SIC Segmented Integer Counter
SISWG Security in Storage Working Group
SRTP Secure Real-time Transport Protocol
SSH Secure Shell
SSL Secure Socket Layer
SSPI Security Support Provider Interface
SV Starting Variable
TDEA Triple Data Encryption Algorithm
TEA Tiny Encryption Algorithm
TEK Traffic Encryption Key
TKIP Temporal Key Integrity Protocol
TLS Transport Layer Security
TSK Transmission Security Key
VMPC Variably Modified Permutation Composition
WEP Wired Equivalent Privacy
WPA Wi-Fi Protected Access
WPA2 Wi-Fi Protected Access II
WPS Wi-Fi Protected Setup
XCBC
XEX Xor-Encrypt-Xor
XOR Exclusive OR
XTS XEX Tweakable Block Cipher with Ciphertext Stealing

Download “list-of-cryptography-terms.csv” list-of-cryptography-terms.csv – Downloaded 145 times – 3 KB

Built with

License

Content on this page is available under a Creative Commons Attribution 3.0 Unported License (CC BY 3.0)
https://creativecommons.org/licenses/by/3.0/. In other words, share generously but provide attribution.

Testing Embed Code Generator

Saw this embed code box on http://money.visualcapitalist.com/all-of-the-worlds-money-and-markets-in-one-visualization/ and saw the site was running WordPress.  The plugin is Embed Code Generator and was installed and tested here.

 

Plugin Name: Embed Code Generator

Plugin Version: 1.1
Requires: 1.5 or higher
Compatible up to: 3.5.2
Last Updated: 3 years ago
Active Installs: 2,000+

Minihawk_ANPR_Camera_on_police_car

Minihawk ANPR Camera on police car

Photograph is in the public domain

https://en.wikipedia.org/wiki/File:Minihawk_ANPR_Camera_on_police_car.JPG

Embed This Image On Your Site (copy code below):