Latest Crypto related questions

Score: 2
Distribution of group elements with chosen bits and hardness of discrete log problem
do flag

For generator $g$ of order $n$ the group elements $y=g^x$mod $n$ are uniformly distributed because of the modulo operation.

Suppose however that from the original output space $Y$, we only consider those elements $y$ which have some bits "fixed" in their binary representation. For example, for $y = y_1,y_2...y_m$ (where $y_i$ is a bit of the m-bit representation of $y$), consider the output space

Score: 0
Bennett avatar
can you generate an ID number quickly, with no collisions, and without IDs revealing information?
ru flag

Is there a standard way to generate ID numbers one after the other such that:

  • You can guarantee, or almost guarantee, that you avoid collisions. (By "almost guarantee", I mean for example if you generated completely random 24-digit numbers, and you "only" generated 1 million of them, then even with the birthday paradox, the odds of a collision would be small.)
  • You want the ID numbers to be short, not ...
Score: 1
Help identifying pubkey format
ru flag

A client has requested us to setup SSL certificate public key pinning for an internal desktop application we are developing for them. They have requested us to pin a specific pubkey but we are not aware of what format it is in.

The pubkey provided is WY*Nhx$kk@PTTz7Ykp*t!q#*8taRR84ZnyT7Rjqc%^29!7zx5GdYa!HSmpM^KQ!D. Any hints to what format its in is greatly appriciated.

Score: 2
Tim avatar
Are pseudorandom generators, pseudorandom permutations and hash functions all keyless?
in flag
Tim

In Katz's Introduction to Modern Cryptography,

Chapter 7 Practical Constructions of Symmetric-Key Primitives

In previous chapters we have demonstrated how secure encryption schemes and message authentication codes can be constructed from cryptographic primitives such as pseudorandom generators (aka stream ciphers), pseudo-random permutations (aka block ciphers), and hash functions.

I have troubl ...

Score: 0
Tim avatar
Is the kind of definition and analysis of hardness of a problem, using "experiment", standard to complexity analysis of problems?
in flag
Tim

In Katz's Introduction to Modern Cryptography, there are several hard problems, and for each problem, there is an experiment, where an algorithm generates a problem instance, and another algorithm solves the problem instance. For example, consider the discrete-logarithm problem in 9.3.2:

Let GG be a group generating algorithm which for each n, generates (G,q,p).

Let A be an algorithm for solving  ...

Score: 1
J. Doe avatar
Which impact on security (factorization) has a common prime factor among prime factors? $N=P\cdot Q$ with $P=2\cdot F\cdot p+1$, $Q=2\cdot F\cdot q+1$
at flag

Which impact on security (factorization) has a common prime factor among the prime factors $P$,$Q$ of a number $N$ $$N=P\cdot Q$$ $$P=2\cdot F\cdot p+1$$ $$Q=2\cdot F\cdot q+1$$ with $F,q,p$ different primes and $F$ the biggest prime factor of $P$ and $Q$ with $$F\gg p,q$$


A potential adversary who want to factorize $N$ does know about the internal structure but does not know $F,p,q,P,Q$


For example

Score: 1
Invalid point attack yields wrong results for low order points
ma flag

I've recently tried to replicate the results of the question Ruggero asked and which Samuel Neves answered here: Understanding Twist Security with respect to short Weierstrass curves

In my attempt to replicate this, I found that the attack does not work for some points. Initially my assumption was that this was because the twist factor $d$ in my case was not $-1 \mod p$. Hence, I asked this question:

Score: 0
Anantashayana Hegde avatar
Proof of Elapsed Time (PoET)
sa flag

Proof of Elapsed Time (PoET) was discovered by Intel in 2016 as a consensus mechanism primarily for permissioned blockchain networks. Importantly, we can only use this concept in permissioned blockchain, not public or private.

I think it is better than all other consensus algorithms as all miners are treated equally here. But why can't we use this concept in cryptocurrencies?

Score: 2
X. G. avatar
Does shared randomness between two cryptographic primitives complicate the hybrid argument for computational indistinguishability?
in flag

Let $(Enc, Dec)$ be an IND-CPA secure encryption scheme, where $Enc: \mathcal{K} \times \mathcal{M}_1 \rightarrow \mathcal{C}_1$, and $F: \mathcal{K} \times \mathcal{M}_2 \rightarrow \mathcal{C}_2$ be a pseudorandom function.

Consider a simple example where we may want to prove the distribution $(Enc_k(m_1), F_k(m_2))$ (whose randomness comes from the shared key $k \leftarrow \mathcal{K}$) is comput ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.