Latest Crypto related questions

Score: 1
Create an or-proof for a given list of elements with public input
es flag

Let $g\in G$ and $h\in H$ be two group generators. Given a list L of m group elements, where $L=(L_1,...,L_m)$, a prover wants to convince a public verifier (namely, a verifier who only has public input) that one element $L_i$ in the list $L$ (without revealing i) can be produced from a public element $ u =u_i$ (where i should not be revealed) and some secret $s_i$, e.g., prove that there is some

Score: 0
phantomcraft avatar
Security of Blowfish with secret S-boxes
pf flag

There are similar questions about secret S-box(es), but none of them about secret Blowfish (or any other canonical Feistel cipher) S-Boxes, only about secret AES S-Box.

Let's suppose that instead of using Pi hexadecimal number in Blowfish S-Boxes, I use my own S-Box taken from /dev/random and keep it secret.

Blowfish modifies all the 32-bits halves of plaintext 16 times, each half gets 8 inputs 32-b ...

Score: 2
phantomcraft avatar
Generate a key with a size bigger than the hash output length/security, is it possible?
pf flag

Let's suppose I want to generate a 2048-bit key from a hash function with security up to 512-bits (such as Blake2b).

I take 4 high-resolution photos, hash them with a hash output length of 512-bits and concatenate all the hashes generating a 256-byte (2048-bits) key.

Will this scheme safely generate a key with real security of 2048-bits?

Score: 0
Tom avatar
Mapping number into number with big algorithmic entropy - how to do it?
tf flag
Tom

I need to parameterize some PRNG, let's assume I need 32-bit numbers. But when numbers doesn't look very random it gives bad results. The creators of SplitMix had similar problem (note that from what I understand they didn't solve it right):

https://www.pcg-random.org/posts/bugs-in-splitmix.html

So I need a function which will transform let's say number 1 into something like 10011110001101110111100 ...

Score: 2
DannyNiu avatar
Linearization attack on group with automorphism
vu flag

Recently, I've had an exchange with Lorenz Panny about Xifrat. He says, that the quasigroup that I use can be linearized and then attacked, and he provided a script that linearized the quasigroup. His result is as follow:

f:
2 0 4 3 5 7 1 6
1 5 3 4 0 6 2 7
7 4 0 5 3 2 6 1
0 2 7 6 1 4 5 3
3 6 1 2 7 5 4 0
6 3 5 0 4 1 7 2
4 7 2 1 6 0 3 5
5 1 6 7 2 3 0 4

g:
2 5 0 6 7 1 3 4
5 2 1 4 3 0 7 6
0 1 2 3 4 5 6 ...
Score: 1
Chito Miranda avatar
On the definition of Gap SVP
us flag

I am confused on the definition of GAP SVP. The problem states that for a fixed $\gamma \geq 1$, given a basis $B$ of a lattice and a $d>0$, GAPSVP asks to determine if $\lambda\leq d$ or $\lambda > \gamma d$. My confusion is that what if $d<\lambda\leq \gamma d$? What would be the answer of GAP SVP then? I read from Micciancio's Fall 2021 CSE206A notes that any answer is acceptable in that case ...

Score: 2
belkarx avatar
Are PKI PQC algorithms slower than their nonPQ counterparts? (e.g. NTRU vs RSA)
es flag

Are the methodologies (hard problems being used to secure the encryption) in post-quantum algorithms inherently slower than what we have right now? If not, why weren't they used initially?

Score: 1
Dimitri Koshelev avatar
Factorization of the product of two specific primes
id flag

Help me please.

Consider specific primes $p = x^{d} + 1$ and $q = x^{e} + 1$ for some $x, d, e \in \mathbb{N}$. Can their product $n = pq$ be factorized faster than the product of general primes ? In other words, is there a factorization algorithm that is more suitable for such $p$, $q$ than the state-of-the-art algorithms for primes of general form ?

Thank you in advance for your response.

Score: 1
Are brute-force attacks made more difficult by removing the LUKS header?
lk flag

If the LUKS header is removed from the LUKS partition, will this make the brute-force attack much more difficult? Can software tell which type of partition is it?

Score: 0
Leviel avatar
Do attackers need to know what ciphers are being used when conducting ciphertext-only, known plaintext, chosen plaintext, and chosen ciphertext attack
br flag

I am trying to understand the basic ingredients needed to conduct various types of cryptanalytical attacks.

For instance, I understand that for Ciphertext-Only Attacks (COA) an attacker only has access to ciphertext.

With Known Plaintext Attacks (KPA), attackers have some ciphertext and possess or deduce with reasonable certainty some portion of plaintext.

Chosen Plaintext Attacks (CPA) involve being a ...

Score: 0
Shakalakah avatar
Data encryption or Blockchain in data sharing between *multiple* sources?
cn flag

imagine several parties that own data, and some of them need to use data of other parties, but have only limited access rights to it. An example:

Party #1 (pharmacy store) needs confirmation from Party #2 (doctor) that Party #3 (patient) was prescribed a medicine, but Party #1 (pharmacy store) shouldn't know the name of Party #3 (patient). Party #4 (drug manufacturer) needs to know when Party #1 ( ...

Score: 0
Eudald Juvanteny avatar
Functional Encrypton: multiplying an encrypted vector by huge known matrix through inner product encrypton?
in flag

I'm solving a kernel ridge regression through a federated learning way. Equation to solve the kernel ridge regerssion is dot((K+lambdaI)^-1,y). So the aggregator of the problem knows the matrix A=(K+lambdaI)^-1.

But it cannot know the value of the labels y. So my idea was to encrypt the vector of labels y and apply inner product encrypton between the rows of the matrix and the encrypted vector. ht ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.