Top new questions this week:
|
According to the Curve25519 website: Computing secret keys. Inside your program, to generate a 32-byte Curve25519 secret key, start by generating 32 secret random bytes from a cryptographically safe …
|
This may be a very basic question. I know that symmetric key algorithms use the same key to encrypt and decrypt plaintext and ciphertext. However, it seems that hash functions are often classified as …
|
Please explain what goes wrong if we always set the IV to 0 in randomized CBC, and use the system to encrypt two different messages m0 /= m1 with the same key k. I …
|
On my old laptop, ChaCha20 is quite a bit faster than AES as there is no hardware acceleration for AES. But for disk encryption AES based schemes seem to be the only option, as a stream cipher like …
|
I’m trying to create a script that will take a snapshot of the contents of a directory. For each file, all possible metadata will be recorded and written to the database. The point is that with some …
|
I’m working on a friendly tower finite field implementation for educational purposes. The library should allow easy building of tower fields from smaller ones – a user may define $\mathbb F_q$ and …
|
If I do a simple encrypt and decrypt test like so: …
|
Greatest hits from previous weeks:
|
Like in title: which one of these encryption methods (ZipCrypto, AES-256) is more secure and why? I am asking about it because I’d like to know which should be preferred when compressing files with …
|
I am often told that any key can be broken and that it is only a matter of time and resources for any key to be broken. I know that this is technically true. However, I think that there is probably a …
|
The diagram below illustrates the process of digitally signing a message with RSA: As diagram shows, the message is first hashed, and the signature is then computed on the hash, rather than on the …
|
I’ve seen some posts and info online, but they are from 2009, 2010, 2011 or 2012, which is 3-6 years ago, which is a very long time. So I’m looking for an up-to-date answer about which of these is the …
|
What is the difference in the purpose of DH and RSA? Aren’t they both public-key encryption?
|
I’ve been thinking about this for a few days, a SHA-256 algorithm outputs 64 characters which can either be a lowercase letter or a number from 0-9. Which should mean that there are 64^36 distinct SHA-…
|
If part of the password is a whole regular English word, does the entropy of that part depend on the number of English words in existence, the number of English words known by the choosing algorithm, …
|
Can you answer these questions?
|
I am working on a system involving multiple parties performing homomorphic cryptographic operations using Microsoft SEAL (BFV). Because of the nature of the system, it would be preferable for the …
|
I have been trying to follow this paper for zk-SNARKs to create Zero Knowledge Proofs (ZKPs) for verifying computations. Specifically, given a public program $F$, a public input $x$, I would like to …
|
In university, I’m currently learning how to use Scyther to model security protocols. Currently I am trying to understand what is happening in an example protocol given to me which is: …
|