Latest Crypto related questions

Score: 3
BlackHat18 avatar
LWE with the matrix A repeated
sy flag

Consider the following version of Learning With Errors.

You are either given $(A, As_1 + e_1, As_2 + e_2, \ldots, As_k + e_k)$ or $(A, u_1, u_2, \ldots, u_k)$, where

  • $A$ is an $m \times n$ matrix whose entries come from the field $\mathbb{Z}_q$ --- the entries are sampled uniformly at random.
  • $u_1, u_2, \ldots, u_k$ are $m \times 1$, each of whose entries come from the field $\mathbb{Z}_q$ unifor ...
Score: 0
Zero knowledge proof of integer factorization
de flag

If I have public element $W=K^r$, and $K=v^x$ should be kept secret where $v$ is a generator in $\mathbb G$, is there a way to produce a zero knowledge proof on x and r such that $W=v^{x \cdot r}$ while committing to $x$ and $r$ individually. Thanks.

Score: 2
Is key rotation necessary when using HMAC as a pseudo random function?
in flag

I need to generate a deterministic identifier from some user data. One of the user data items is highly sensitive, but the other two are not. The identifier will be sent to an external party regularly, so it must not change in the future - i.e. the same input should always produce the same output in the future.

A pseudo random function (PRF) seems like an ideal solution to this problem. We use th ...

Score: 4
Why is this function bijective?
de flag

I cannot seem to understand why the function $F$ defined in Theorem 7.1 of the paper “Permutation rotation-symmetric Sboxes, liftings and affine equivalence” is described as “a bijection on $\mathbb{F}_2^n$”.

The input contains $n$ bits, yet the given definition seems to imply that the output contains $k=n-2$ bits: $$F(x_1, x_2, \ldots, x_n) = (f(x_1, \ldots, x_k), f(x_2, \ldots, x_{k+1}), \ldots ...

Score: 1
Josh avatar
Understanding intermediate values - SHA2 - 512
fr flag

I am trying to understand SHA2 - 512 algorithm, so I am following this document which has the intermediate values for the string "abc". At t=0, the values for f, h and g are straightforward. But I am not getting the same value for e, which suggests that I am doing something wrong when I am computing $T_1 = h + \Sigma_1(e) + \text{Ch}(e,f,g) + K_i + W_i$. I am almost sure that I have implemented $ ...

Score: 0
Him avatar
How much time do commodity computers spend doing bulk data (en)(de)cryption on average?
pt flag
Him

With the proliferation of https, and one of the primary functions of my pc being browsing the intarwebs, it occurs to me that my cpu is spending a lot of cycles doing AES en and de cryption. For the "average" PC (i.e. not servers or supercomputers, which is an interesting but different question), about what percent of one's cpu cycles are spent doing bulk data encryption? How does this compare with oth ...

Score: 1
knaccc avatar
Necessary Schnorr signature non-interactive challenge bindings
es flag

Some implementations of a Schnorr signature will determine the challenge as follows:

$c=H(kG \mathbin\| X \mathbin\| m)==H(rG+cX \mathbin\| X \mathbin\| m)$, where:

$c$ is the challenge
$m$ is the message being signed
$X$ is the public key of the signer such that $X=xG$
$G$ is a well-known base point
$x$ is the private key of the signer
$r$ is the response to the challenge, calculated as $r=k-cx$

Score: 1
omid torki avatar
Problem with Shamir secret sharing degree reduction in multiplication gate
in flag

The process of Shamir secret sharing degree reduction in multiplication gate is explained in the following link

Now, based on the secret sharing that done by a degree one polynomial, we must be able to reconstruct the secret, i.e. $10$, with each of the $2$ shares out of the $3$ shares $(3, 7, 0)$. Nevertheless, the reconstructed secret using $(3, 7)$ is correctly $10$, but reconstructed secret using ...

Score: 0
Session Key Exchange Algorithm - Finding the Security Flaw
cn flag

The protocol shown in the Figure is open for an attack that will let an attacker learn the secret value from the server without having to know the key Kcs. Can anyone help in finding such an attack? Only, the client C and server S share the symmetric key Kcs. Regards.

enter image description here

Score: 0
banoosh avatar
does hill cipher use which matrix
in flag

I found in many recourses that hill cipher uses 2X2 and 2X1, other uses 1X2 and 2X2 so which one is correct, if I one matrix and turned it into another it does work? so which one to use

Score: 1
user77340 avatar
Is f(G) uniform under the described condition in ECDSA?
ie flag

In ECDSA, $f(G)=r$, where $r$ is the $$-coordinate of group element $G$. Now it is known that $f(G)$ is not uniform(Why isn't $f(G)$ uniform in ECDSA?). Then in which range $f(G)$ is uniform?

Let $\langle G\rangle$ be a cyclic group on the ECDSA elliptic curve with the generator $G$, and $S=\{x|f(W)=x,\forall W\in\langle G\rangle\}$. My question is: for any $W\overset{\\\$}{\leftarrow}\langle G\rang ...

Score: 0
What is required to use a cryptographic algorithm backdoor?
jp flag

David Wong in his book Real-World Cryptography writes:

In 2013, following revelations from Edward Snowden, it was discovered that NSA had purposefully and successfully pushed for the inclusion of backdoor algorithms in standards (see “Dual EC: A Standardized Back Door” by Bernstein et al.), which included a hidden switch that allowed NSA, and only the NSA, to predict your secrets. These backdoors ca ...

Score: 1
J. Doe avatar
How secure is a projection to a subspace with much lower member size for $x\mapsto x^a$ mod $N = PQ$, $P=2p+1$, $Q=2qr+1$, to target space $r=2abc+1$?
at flag

A cyclic sequence can be produced with

$$s_{i+1} = s_i^a \mod N$$ with $N = P \cdot Q$ and $P = 2\cdot p+1$ and $Q = 2\cdot q\cdot r+1$ and $r = 2\cdot u \cdot v \cdot w +1$ with $P,Q,p,q,r,u,v,w$ different primes

We can now project a random number $x_R$ into a subspace of size $2(r-1)+4$ with $$s_R = x_R^{\beta} \mod N$$ $$\beta = 2\cdot p \cdot q \cdot n \mod \phi(N)$$ with a factor $n$ of choice.

 ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.