Top new questions this week:
|
What is the best known attack on the stream cipher Trivium? And is there is any good reason to not use it? By googling the good key words, I’ve found this paper, but I’m not enough expert to judge the …
|
Why are credit cards using 3DES instead of AES? As far I understood, even DES3 is less secure than AES. Why it is still used? I searched already in the internet and forum to check out if it is …
|
I’m writing a school paper about Blowfish encryption, and couldn’t seem to find out if the size of the subkey array for Blowfish changes based on the length of the key. I would assume that it doesn’t …
|
I’m trying to formalize the following protocol in $\mathsf{ProVerif}$, where $m$, $p$ are messages, $j$, $k$, $h$ are private keys, and $\{m\}_k$ is the ciphertext obtained by encrypting $m$ with $k$. …
|
I am trying to understand the implication of the Borel-Cantelli Lemma to the random oracle model. I think understanding a special case, say, a random oracle is one-way with probability 1, would be …
|
I am currently writing a seminar paper on Kyber and other lattice-based methods. I was so excited about the lattice-based methods that I also currently searched quantum algorithms to solve the methods….
|
I wondered whether my understanding of entropy is correct, that a 256-bit counter that starts at 0 and counts to 2^256 – 1 by a <...
|
Greatest hits from previous weeks:
|
In AES we use some padded bytes at end of message to fit 128/256 byte blocks. But as RSA is not a block cipher why is padding used? Can the message size be any byte length (is the encrypting agent …
|
We had a quiz in class today where we had to break the ciphertext with the key given, but not the algorithm. Suffice to say that I wasn’t able to decrypt it within the allotted time of 12 mins and …
|
I’m using Java to generate encrypted strings, and I get this warning at build time: ECB encryption mode should not be used So I’m wondering why I shouldn’t use ECB and what I can use instead?
|
The diagram below illustrates the process of digitally signing a message with RSA: As diagram shows, the message is first hashed, and the signature is then computed on the hash, rather than on the …
|
I think 1024 bit RSA keys were considered secure ~5 years ago, but I assume that’s not true anymore. Can 2048 or 4096 keys still be relied upon, or have we gained too much computing power in the …
|
I am working on a web application enabling users to communicate over private messages which is just one part of the whole system. The main focus during my development process is to protect the privacy …
|
Why do we use modular arithmetic so often in Cryptography?
|
Can you answer these questions?
|
When we consider a group generation algorithm $\mathcal{G}$ (taken from Katz and Lindell’s Introduction to Modern Cryptography), that takes as input a security parameter $1^n$ and outputs $(\mathbb{Z}…
|
I want to accredit members so they can pseudonymously give feedback while still being provably part of a group, without a way to give extra accreditations. Suppose a group of 100 members (I decide and …
|
I asked OpenSSL to generate a dummy Ed25519 private key for me and got this output: lapo.it/asn1js/#MC4CAQAwBQYDK2VwBCIEIJCO9eKZEUOmL9CGfecuKqvYU_hLTAFXwl0Ipd8xNXbP It decodes to the following:…
|