Top new questions this week:
|
Last year I learned about another NIST competition. csrc.nist.gov/projects/lightweight-cryptography/finalists And I thought to myself: “why would I continue to use heavyweight …
|
As far as I know, when someone says ‘a reduction is tight’, it means that given that there is an adversary $A$ with advantage $\epsilon$ and running time $t$ and another adversary $B$ utilizing $A$ …
|
In NTRU algorithm one is supposed generate a vector which is invertible as a polynomial in both $(Z/pZ)[x]/(x^n-1)$ and $(Z/qZ)[x]/(x^n-1)$. But is there a mathematical lower bound to the probability …
|
This may be a polemic question, but since I did read the rules of the site and “terms and definitions” appear to be legitimate subjects, I want to raise this because I find this interesting, …
|
I have been working on the post-quantum safe ID/signature-schemes of Vadim Lyubashevsky (www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf). I am in particular studying the security …
|
Suppose an adversary wins IND-CPA against ElGamal, They’re given public key $h=g^x$, Give a pair of messages $m = [m0,m1]$, Get back ciphertext $(a,b) = (g^r, g^{xr} \cdot g^{m[b]})$, from which …
|
I have been working through the introduction to cryptography with coding theory book and have just come across Shamir secret sharing questions. However I just don’t quite think I’m understanding it …
|
Greatest hits from previous weeks:
|
Most of the time, when some data must be encrypted, it must also be protected with a MAC, because encryption protects only against passive attackers. There are some nifty encryption modes which …
|
Given $n=pq$ for $p,q$ known, I can calculate $\phi(n)$. $e$ is selected such that $\gcd (e,\phi(n)) = 1$. Using this, how do I calculate the RSA private key? Example: I have $n = 35$, with $(p,…
|
Frequently, we want to send messages that are (a) encrypted, so passive attackers can’t discover the plaintext of the message, and (b) signed with a private-key digital signature, so active attackers …
|
I can’t really understand MixColumns in the Advanced Encryption Standard, can anyone help me how to do this? I found some topics on the internet about MixColumns, but I still have a lot of questions …
|
I’ve seen some posts and info online, but they are from 2009, 2010, 2011 or 2012, which is 3-6 years ago, which is a very long time. So I’m looking for an up-to-date answer about which of these is the …
|
Given that much of our ECC crypto primitives provide “only” 128-bit security when defined over a 256-bit curve due to pollard-rho, is it then still safe in 2020 to consider 128-bit security safe for …
|
Most of the answers I can find date to years back where the first collision(s) were found, but hardware mainly GPUs have progressed a lot in the past few years (with for example the new line of 3090s …
|
Can you answer these questions?
|
I have a very important string it’s of around 20-40 words. I want to encrypt this string and store it online . Which encryption algorithm will be useful for me.
|
I’m looking for some basic algorithm to: generate a code => send it to a website, where after payment a token is generated from the code and sent back, where the token is validated. I’m not sure …
|
This is zero-knowledge proof that show x is not a quadratic residue. I am trying to verify Honest verifier zero knowledge property. My steps were these: Let S be a simulator that does not know how to …
|