Top new questions this week:
|
In mpz_nextprime(), after some sieving with small primes, an MR test function is called, with the number of trials set to 25 (github.com/alisw/GMP/blob/…
|
I’ve been reading this set of notes on some topics in MPC and am having difficulty understanding the transformation the authors make in order to reduce the round complexity of the GMW protocol through …
|
OK, so I know that this is somewhat really basic in “post-quantum discourse”, but unfortunately I did not find any textbooks/entry level papers specific to the topic of reductions in the …
|
I’ve found this question from 2014 on Key Whitening: How exactly does key whitening manage to increase security? where is said that AES applies key whitening internally by adding a sub-key prior to …
|
I have some questions about the Kyber paper, especially about Theorem 2 on page 6, which I would like to ask here. First of all I quote the following theorem from the paper and ask my questions …
|
MPC protocols have a harder time handling division (truncation) than multiplication. The case I am considering is when the divisor is a public value. Dividing it may lead to a wrong result due to …
|
Sorry if this is a duplicate but, to be honest, I don’t even know how to search for an answer to it. I’m working in an environment in which I cannot use streams to encrypt data (React Native using the …
|
Greatest hits from previous weeks:
|
I read that A typical stream cipher encrypts plaintext one byte at a time, although a stream cipher may be designed to operate on one bit at a time or on units larger than a byte at a time. (…
|
From Wikipedia: Second pre-image resistance Given an input $m_1$ it should be difficult to find another input $m_2$ such that $m_1$ ≠ $m_2$ and $\operatorname{hash}(m_1) = \operatorname{hash}…
|
I’ve already sent my correct solution to a homework exercise from Dan Boneh’s Introduction to Cryptography class on Coursera: “Let us see what goes wrong when a stream cipher key is used more …
|
Can someone tell me which mode out of ECB and CBC is better, and how to decide which mode to use? Are there any other modes which are better?
|
Why do we use modular arithmetic so often in Cryptography?
|
I’m using the SHA1/2 family of algorithms for a particular project. I was wondering if all the SHA algorithms return a fixed length hash regardless of the length of the data.
|
I was wondering about the difference between these two terms… What is the difference between a digest and a hash function?
|
Can you answer these questions?
|
Given two functions f,g we have to construct h; such that h is one way function. Either f or g is a one way function. We don’t know which one is a one way function. Both f and g are defined over X->…
|
If you were designing: An open source client that offered E2E encryption for e.g. folder sharing between users Each user had public keys for signing (and separate public keys for encryption of …
|
About Rabin Signature link According to this paper, the person who wants to sign a message M first appends a random byte string U. => M_new = MU Then uses a compression function to get c = …
|