Top new questions this week:
|
There is a claim by Chinese researchers making the rounds (Schneier’s blog here) that RSA can be broken by Quantum Computers. The paper is on arXiv. Wading through the discussion in Schneier’s blog, …
|
I’m watching “SSL, TLS, HTTPS Explained” by ByteByteGo on YouTube and at the end, starting around 5:15, there are two points that are interesting: in TLS 1.3 RSA is no longer supported as …
|
I’m working on some RSA code that uses Toms Fast Math (TFM for short), and I’m trying to understand why the functions fp_exptmod (for modular exponentiation …
|
NIST P-521 has the longest key size for standardised ECC, which has 521 bits instead of 512. If a quantum computer is available, how many qubits can break P-521?
|
I’m somewhat confused about how the definition of a proof of knowledge relates to the Theorem 19.1 in Boneh-Shoup (toc.cryptobook.us/book.pdf), particularly in relation to Schnorr’s protocol …
|
Cryptographic sponge functions are a hot topic right now with LWC and all. They solve the symmetric crypto problem with simplicity and efficiency. However, none of them seem to achieve 256-bit …
|
I have access to an HSM that can sign messages but doesn’t have a way to expose the private key. The signatures are deterministic (RFC 6979). Another application only works with ed25519 signatures …
|
Greatest hits from previous weeks:
|
I’m very uneducated when it comes to cryptography. I have tried to find an answer to my question, but what I’ve read doesn’t quite cover what I’m asking. I have thought up my own encryption algorithm …
|
I have three questions: Would you use HMAC-SHA1 or HMAC-SHA256 for message authentication? How much HMAC-SHA256 is slower than HMAC-SHA1? Are the security improvements of SHA256 (over SHA1) enough to …
|
Every API that I have ever signed up with gives you a secret key that you can then paste into your application. They know the key, and so do you. (The one exception may be VAPID for Web Push). Why is …
|
I’m using the SHA1/2 family of algorithms for a particular project. I was wondering if all the SHA algorithms return a fixed length hash regardless of the length of the data.
|
I am a programmer, so when I hear XOR, I think about the bitwise operator (e.g. 0110 ^ 1110 = 1000). The mention of “XOR” comes …
|
Can someone tell me which mode out of ECB and CBC is better, and how to decide which mode to use? Are there any other modes which are better?
|
I (for a test) just randomly altered a private RSA key by opening it up in Vim and changing a few bytes. It is the private part of an SSH key pair used for logging in on a remote system. Puzzlingly, …
|
Can you answer these questions?
|
You can get access to this document via institutional login at www.researchgate.net/publication/220556089_Security_and_composition_of_cryptographic_protocols_A_tutorial So in Ran Canettis …
|
I am searching for the exact definition of High density SIS and Low density SIS, but there is something unclear about it. SIS problem is to find $x\in \mathbb{Z}^m$ such that for random $A\in\mathbb{Z}…
|
Based on the Schnorr signature below: What is the suitable size of lamda to generate a secure key?
|