Latest Crypto related questions

Score: 1
Self-blindable certificates + group signatures
cn flag

I am searching for a scheme supporting group signatures and at the same time permitting the blinding of the message-signature pair. Let me explain.

There is a certification scheme proposed by Verheul: if we have message that is a public key, say $\texttt{pk}(A)$, and a signature $\texttt{sig}(\texttt{pk}(A), s)$ made with the secret key $s$, Verheul scheme respects blinding: $$\texttt{verify}(\left<\t ...

Score: 1
siba36 avatar
differential diffusion property of addition in SPECK cipher
us flag

I'm studying Impossible Differential Cryptanalysis of SPECK paper and I'm having trouble understanding the differential diffusion property of addition in page 19 which is as follows:

enter image description here

can someone explain what that property means or what symbol k|∆x[K] means?

Score: 0
Dylan avatar
A single array access with multiplexers to achieve obliviousness
bb flag

I'm new to secure multi-party computation and ORAM. My question is quite simple.

Is there a concrete example to explain the linear scan for an array with multiplexers to achieve obliviousness?

I didn't find any good examples to explain this.

Additionally, in a linear scan, each access of an n-element array requires a circuit of Θ(n) size where the entire array is multiplexed for the required ele ...

Score: 0
Leo avatar
How proxy re-encryption works - layman perspective
br flag
Leo

Here is the use case: A uses B's public key to encrypt a message and sent it to B. In later stages, a new member C joins and B would like to let C be able to see this encrypted message (i.e., give the decryption ability to C) without sharing his/her private key or letting A encrypt the message again using C's public key. It is in this question. A useful solution in that question is proxy re-encryption. I ...

Score: 0
oxear08 avatar
the matching private key of a certificate -- how to get it?
jp flag

If A has a certificate issued by a CA_X, certainly A should have the private key of the certificate. My question is, does A generate the private key by itself, or , the private key is generated by CA_X, and somehow is sent by the CA_X to A?

Score: 12
Current Consensus on Security of Lattice Based Cryptography?
ca flag

In an edit to an answer by user forest, it was mentioned that there has been a new attack developed for lattice-based cryptography. I thought lattice-based cryptography is a fairly well established way of providing quantum-computing-proof security, and that the only thing left to do is developed a standardised system at NIST.

But the current attack leads me to my question: Is there a current conse ...

Score: 2
Dominic van der Zypen avatar
Finite fiber of SHA512
br flag

Let $\{0,1\}^*$ be the set of finite $\{0,1\}$-strings. Then SHA512 can be viewed as a map $s: \{0,1\}^*\to \{0,1\}^{512}$.

The pidgeonhole principle implies that there is $y\in \{0,1\}^{512}$ such that $s^{-1}(\{y\})$ is infinite.

Is there $y\in\{0,1\}^{512}$ with $\emptyset \neq s^{-1}(\{y\})$ and $s^{-1}(\{y\})$ is finite?

Score: 0
Turbo avatar
Using Coppersmith for a second trivariate polynomial
ru flag

I have a trivariate polynomial whose roots I am interested. The polynomial has monomials in $\{X^4,X^2,X^2Y,X^2Z,1\}$. What is the best way to generate the lattice and apply $LLL$ so that I can get a second polynomial in common with the first under the assumption the polynomial has size of coefficients which satisfy Howgrave-Graham bound applicable to Coppersmith's techniques?

Score: 0
blackyellow avatar
Find multiplicative inverse in Galois field $2^8$ using extended Euclides algorithms
sx flag

I'm dealing with Galois fields $GF(2^{8})$ and need help finding a polynomial $r^{-1}(x)$ such that $r^{-1}(x) r(x) \equiv 1 \mod m(x)$, where:

  • $m(x) = x^{8} + x^{4} + x^{3} + x + 1$
  • $r(x) = u(x) - q(x) \cdot m(x)$
  • $u(x) = s(x) \cdot t(x)$
  • $s(x) = x^{7} + x^{5} + x^{4} + x$
  • $t(x) = x^{4} + x^{2} + 1$

Thus:

  • $u(x) = x^{11} + x^{8} + x^{6} + x^{4} + x^{3} + x$
  • $q(x) = x^{3} + 1$
  • $r(x) = -x^{7} - x^{4}  ...
Score: 4
Can you really ignore number of quantum processing steps needed for Shor's algorithm?
gs flag

Answers to question RSA key length vs. Shor's algorithm suggest that e.g. 2048 bit RSA encryption would be trivially broken with 4099 qubit quantum computer using Shor's algorithm (best known implementation of the algorithm requiring 2n+3 qubits).

Is this really true? If I've understood correctly, the number of gates (logically quantum operations) needed would be around log(2^2048)^2×log(log(2^20 ...

Score: 4
C.S. avatar
Difference between FFT and NTT
in flag

What are the main differences between the Fast Fourier Transform (FFT) and the Number Theoretical Transform (NTT)?

Why do we use the NTT and not the FFT in cryptographic applications?

Which one is a generalization of the other?

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.