Latest Crypto related questions

Score: 0
Robert Singleton avatar
AES and quantum computing
za flag

I am trying to understand the AES-256 encryption algorithm as it would be implemented on a gated quantum computer (actually, a simulator), and I am having some trouble understanding the theory behind it. The papers I read start with the ring of polynomials given by $F_2[x]/(1 + x + x^3 + x^6 + x^8)$. What is the significance of the polynomial $1 + x + x^3 + x^6 + x^8$? And how does this relate to

Score: 1
Turbo avatar
Does generic group black box model prohibit MSB of discrete logarithm?
ru flag

Black box generic models prohibit calculation of discrete logarithm in groups of order $q=2p+1$ where $p,q$ are random primes to $\Omega(\sqrt{p})$ steps (refer Discrete Logarithm in the generic group model is hard - Theorem by Shoup).

Do the black box generic models also prohibit MSB of discrete logarithm to $\Omega(\sqrt{p})$ steps or is it possible black box generic algorithms can get MSB of discret ...

Score: 0
Septatrix avatar
Has reducing MAC size and increasing message size the same effect on security?
ph flag

I am evaluating ways to reduce the overhead of (H)MACs on small messages. I was primarily wondering if there is a difference between halving the MAC length or keeping the same MAC length but using it to authenticate a message of twice the size.

My initial thought was that the message/MAC ration would be the same though then it occured to me that this is probably not the complete picture as each i ...

Score: 1
Generating Alternative Initial Value while wrapping keys with AES
us flag

Am following the instructions on https://datatracker.ietf.org/doc/html/rfc5649#section-3 ("AES Key Wrap with Padding Algorithm") and I have gotten to a point where I need to generate the LSB(32,A) for the Alternative Initial Value (AIV). Am using NodeJS with buffers to implement the algorithm. My understanding is 32-bits === buffer.length == 4 or in other words, length 4 of buffer is the 32-bits re ...

Score: 0
Rabindra Moirangthem avatar
Does the searchable encryption scheme satisfy trapdoor indistinguishability?
in flag

In a searchable encryption scheme based on the certificateless cryptosystem, the trapdoor generation algorithm only has a hash function that outputs an integer value. Does the scheme satisfy trapdoor indistinguishability? If so, how can we prove it?

Score: 0
Suppose there exists a one-way function, show that there exists a one-way function with none of its input bit is a hardcore bit
us flag

I just learnt the definition of hardcore bit, and I have no intuition about this. I want to know what are the possible approaches to this problem.

Score: 0
phantomcraft avatar
Does random IVs in CTR block cipher mode combined with XOR allow to encrypt number of blocks up to the same numeric count of IV?
pf flag

I read about CTR block cipher mode in Wikipedia: "If the IV/nonce is random, then they can be combined with the counter using any invertible operation (concatenation, addition, or XOR) to produce the actual unique counter block for encryption."

Let's suppose I want to make a enciphering scheme with CTR and AES in which I XOR the counter value with the full IV.

Does it have advantage over combining a ...

Score: 0
phantomcraft avatar
If converting a SPN Block Cipher to a version with larger block size, should its S-boxes be enlarged too?
pf flag

Let's suppose I want to convert a Substitution-permutation network block cipher like Kuznyechik to a version with a larger block size.

Should its S-boxes be enlarged too in order to achieve similar security?

Score: 0
Tim avatar
Is a perfect hash function the same concept as a collision-resistant hash function?
in flag
Tim

About collision-resistant hash functions, in Katz's Introduction to Modern Cryptography,

6.1 Definitions

Hash functions are simply functions that take inputs of some length and compress them into short, fixed-length outputs. The classic use of (non- cryptographic) hash functions is in data structures, where they can be used to build hash tables that enable O(1) lookup time when storing a set of e ...

Score: 0
Passi avatar
RSA rsa residue class ring
th flag

I've been working on the RSA method for several weeks and I don't understand what this residual class ring is all about.

I understand that if

$ x^e \bmod n$ there must be $x<n$ because of the clarity of the results

However, I don't understand what other advantages it brings.

When I look for manipulation attempts on the Internet, the modulo calculation is always very simple:

$(s^e y)^d \e ...

Score: 0
Aleix Martí avatar
How to know if a power is a permutation of an inverse group
fr flag

Consider the group $$ℤ^*_{55}$$

Is exponentiating to the 3rd power a permutation of: $$ℤ^*_{55}$$ And exponentiation to the 5th power?

I'm trying to solve this problem related to groups, but I don't know how to do it. Is there a mechanical way to find it? Something like a formula?

Score: 2
Chaum-Pedersen Protocol
ph flag

I'm junior software developer and I need to implement a very simple authentication system based on Chaum-Pedersen ZKP Protocol. I know nothing about cryptography and I ask you to help me understand one thing in algorithm. An algorithm looks as follows: enter image description here

I just can't get what $q$ is. I've read about protocol in Cryptography: An Introduction by Nigel Smart. There's a phrase: 'We assume that $g$ and

Score: 6
Dominic van der Zypen avatar
Majority-based feedback shift register
br flag

Linear feedback shift registers (LFSR's) work by taking a fixed-length bit-string $b\in\{0,1\}^n$, as well as fixed "taps" (bit positions) and applying XOR to the taps, giving one output bit, which is appended at the $b$ after shifting it.

Now XOR is a linear function. A natural non-linear function that can be used on the fixed set of taps is a kind of "majority vote", which works as follows: if  ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.