Latest Crypto related questions

Score: 0
Arian B avatar
Is BLS multi-signature aggregation separable?
in flag

In BLS multi-signature aggregation scheme we can combine different signatures of different peers into one single signature, and then we can verify whether the aggregated signature is truly signed by the claimed peers.

My questions is, having an aggregated signature, is it possible to separate the signatures and achieve the individual signatures of the peers? For example, having an aggregated sign ...

Score: 1
Zoey avatar
Sampling from ring of integers
cn flag

There is a statement in the paper "Asymptotically Efficient Lattice-Based Digital Signatures" by Lyubashevsky and Micciancio that says that "it is important that the ring of integers of $\mathbb{Q}(ζ)$, is efficiently samplable in practice - which is not known to be the case for particularly compact choices." Note that $\mathbb{Q}(ζ)$ is the number field where $ζ$ is the primitive root of $f( ...

Score: 1
fadedbee avatar
Is it safe to sign message with a TLS private key?
br flag

I want to sign all of the HTML and JavaScript from my site with the site's TLS private key.

(The hex signature will be preceded with a <!-- comment which is valid for both HTML and JavaScript, and attached to the end of the text files.)

This is so that end users can prove that malicious JavaScript came from us, and so gain confidence that we would never do so.

Are there any security problems when ...

Score: 2
Rory avatar
Breaking CDH also breaks DHI
mp flag

I am trying to show that by breaking the Computational Diffie-Hellmann (CDH) assumption one also breaks the Diffie-Hellmann inverse assumption. Unfortunately, I am a bit stuck and do not know where to go. I suspect that bilinearity property from the pairing group given by $PGGen$ is at fault, but I do not know quite sure how to approach the problem further. The definitions are as below.

With the Comput ...

Score: 0
How to assign md5 of another file to one wav file?
nf flag

Good afternoon . Please tell me how to change the md5 hash of one wav file to the md5 hash of another wav file. I want to bypass the anti-cheat check on md5. Maybe there are online paid services? I know English badly. I know that there have already been similar topics, but I could not do anything. Thanks!

Score: 1
crypcrypcryp avatar
Embedding degree of curves of characteristic 2 and ECDLP transfer
ru flag

It is known that we can transfer an ECDLP instance on a curve $E$ defined over $\mathbb{F}_p$ for prime $p$, to a discrete-log instance in $\mathbb{F}_{p^k}$ for some $k$. It is referred to as the embedding degree, and is the smallest integer $k$ such that the order of the curve divides $p^k-1$.

(One way to do this is using pairings.)

I am interested in the binary curves, e.g. defined over $\mathbb{ ...

Score: 0
EC NIST P-256 FIPS-186-4 B.5.1 Per-Message Secret Number Generation Using Extra Random Bits operation
cn flag

I need to implement following operation:

w = (z mod (n-1)) + 1

where

z: 40-byte array

n: the order n of base point defined for NIST P-256.

I assume that resulted 'w' could be a point on the curve.

Any opinions are more than welcome

Score: 2
B.H. avatar
Is DSA still secure without the factor "r"?
sy flag

If I understand correctly, the way DSA in a group $G$ with a hash function $H$ works is: Peggy (signer) has a private/public key pair $x$, $g^x$. For signing, she produces a random session key $k$, $g^k$ then computes the signature: $s=\frac{H(m)+xF(g^k)}{k}$ where F is some "reasonably uniform function" $F: G \rightarrow \frac{\mathbb{Z}}{|G|\mathbb{Z}}$. To verify the signature, Victor checks that

Score: 1
Random avatar
Murru Saettone RSA
us flag

Before you ask, this is neither for a CTF or homework, this is on problems in implementing non-standard RSA. If it feels like it is a CTF problem I will remove this post if necessary.

Murru Saettone RSA is a variant and quite vulnerable (to a continued fraction attack) RSA scheme based on the cubic pell equation. When implementing this in python, my encryption function appears to (may not) encrypt the ...

Score: 1
J. Doe avatar
Question about sequence length/count/security of $x\mapsto x^\alpha \mod (N=Q\cdot R)$, with $Q=2q_1q_2+1$ and $R=2r_1r_2+1$ and $\alpha = 2q_2r_2$
at flag

Given a number $N$ with $$N=Q\cdot R$$ $$Q=2\cdot q_1 \cdot q_2+1$$ $$R=2\cdot r_1\cdot r_2+1$$ with different primes $P,Q,q_1,q_2,r_1,r_2$.

If we now choose an exponent $\alpha$ containing prime factors of $Q,R$ with $$\alpha=2 \cdot q_2 \cdot r_2$$ we can generate a sequence $S$ with elements $$s_{i+1} = s_i^\alpha \mod N$$ starting at a value $s_0$ $$s_0 = x^\alpha \mod N\textbf{ }\text{ with}\text ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.