Latest Crypto related questions

Score: 1
J. Doe avatar
How secure is a projection to a subspace with much lower member size for $x\mapsto x^a$ mod $N = PQ$, $P=2p+1$, $Q=2qr+1$, to target space $r=2abc+1$?
at flag

A cyclic sequence can be produced with

$$s_{i+1} = s_i^a \mod N$$ with $N = P \cdot Q$ and $P = 2\cdot p+1$ and $Q = 2\cdot q\cdot r+1$ and $r = 2\cdot u \cdot v \cdot w +1$ with $P,Q,p,q,r,u,v,w$ different primes

We can now project a random number $x_R$ into a subspace of size $2(r-1)+4$ with $$s_R = x_R^{\beta} \mod N$$ $$\beta = 2\cdot p \cdot q \cdot n \mod \phi(N)$$ with a factor $n$ of choice.

 ...
Score: 1
Can Shor's algorithm factor over finite fields/rings/groups?
dz flag

Shor's algorithm can (efficiently) solve equations of the form:

$$n = pq$$

and

$$n = x^{2} + y^{2}$$

This question is simple: Can Shor's algorithm solve these equations in polynomial time when they are performed with finite arithmetic instead of over integers? i.e.

$$n = pq \bmod k$$

and

$$n = x^{2} + y^{2} \bmod k$$

Sizes of the Terms

At least in the factoring case if $\log_{2}(p) = \log_{2}(q) = \log_{2 ...

Score: 0
Why is a protocol that is secure in the presence of a malicious adversary also secure in the presence of an augmented semi-honest adversary?
cn flag

Proposition Let π be a protocol that securely computes a functionality f in the presence of malicious adversaries. Then π securely computes f in the presence of augmented semi-honest adversaries.

Proof. Let π be a protocol that securely computes f in the presence of malicious adversaries. Let A be an augmented semi-honest real adversary and let S be the simulator for A that is guaranteed to exist ...

Score: 0
Krzysztofz01 avatar
Proving identity in asymmetrically encrypted communication
cn flag

Let's assume such a scenario. Person A will broadcast his public key and person B will broadcast his public key. They can now communicate. But let's say that suddenly another person C will write to person A impersonation person B. How can a person B prove their identity. We can implement a signature system. Person A will genereate a certain signature and gives it to person B, to always join it to t ...

Score: 2
Min avatar
What is $z$ in specification of Classic Mceliece?
my flag
Min

I have a question about $z$ in Classic Mceliece Algorithm specification. enter image description here

I have no idea about this $z$! In parameter set kem/mceliece348864, Field polynomial $f(z) = z^{12} + z^3 + 1$. is this $z$ in field polynomial same as the $z$ in pic? If this is right, the value of $z$ in the pic for kem/mceliece348864 is $(z^1, z^2, z^3, \dots, z^{11}) = (0, 0, 1, 0, \dots, 0)$?

please help me! Thanks

Score: 1
ThreadBucks avatar
Analysis of the Vigenere cipher
eg flag

Im just starting out learning some cryptoanalysis techniques. I came across an idea which analyzes the vigenere cipher. Essentially the video explains that there is a standard english probability density function for each letter of the alphabet. And the letters used in the encryption of the message is called the key. And they have an effect of shifting the probability density function. The probabilities ...

Score: 1
How does the indexing in Argon2 work?
in flag

I am reading the original paper of Argon2 authors and I can understand the algorithm except the indexing part. Can anyone explain two things:

  1. the indexing process and the mapping $J_{1}$, $J_{2}$ to reference block index.
  2. How the $B_{i'j'}$ are fixed in Argon2d, Argon2i and Argon2id.

I tried to simplify things by taking a few lanes and columns but still could not get what is happening in the indexin ...

Score: 2
Linear approximation of modular addition of a constant?
np flag

In Linear Approximations of Additions Modulo $2^n$, Wallén shows how to compute the correlation of the modular addition of two binary bit vectors. A simple recursive procedure was given by Schulte-Geers in On CCZ-equivalence of Addition mod $2^n$. However, these papers both assume that the summands are uniformly distributed random variables over $\mathbb{F}_2^n$.

Suppose one has $f: \mathbb{F}_2^ ...

Score: 3
Can Shor's algorithm factor over the gaussian integers?
dz flag

This is related to this question about solving the following expression:

$$x^{2} + y^{2}$$

This can be factored over the gaussian integers as

$$(x + iy)(x - iy)$$

If one could factor a sum of two squares and take the integer component $x$ one could solve the problem.

Can Shor's algorithm factor a term over gaussian integers? More precisely can it be used to solve the sum of two squares problem?

Score: 1
Margareth Reena avatar
Why RLWE is lighter than LWE and why we can pick $a_i$ as a permutation of $a_1$ in RLWE but not LWE?
id flag

In LWE, we have

$$<a_1,s> + e + \mu_1\in \mathbb{Z}_q$$

for a secret key $s\in \{0,1\}^n$ and $a_1\in \mathbb{Z}_q^n$

This is an encryption of a number $\mu_1$. If we want to encrypt $n$ different $\mu_i$, we need $n$ different $a_i$. With $n$ values $a_{11}, ..., a_{1n}$ we were able to encrypt one single $\mu_1$.

For RLWE, we have

$$a*s +e + m \in \mathbb{Z}_q[X]^n$$

for $a\in \mathbb{Z}_q[X] ...

Score: 2
Eugene avatar
Why do most authenticated encryption primitives expect an unpredictable and uniformly random key in order to be secure?
cn flag

I've noticed that keys for authenticated encryption primitives like AES must be unpredictable and uniformly random in order to be secure. IV values and seeds for PRNGs also have to be unpredictable and random.

My question is: How those unpredictable and random values are different from predictable values that contain whole english words, for example (like verysecretkey123456)?

I assume from the persp ...

Score: 0
Pseudorandom permutations
hu flag

So I am trying to solve some exercises about pseudorandom permutations.

Assume that keyed-permuation $E_k(x)$ is a pseudorandom permutation, where $|x|=|k|=n$. Using $E_k(x)$, we construct an encryption sheme as follows.
$$ c=m\oplus E_k(0^n)\\ m=c\oplus E_k(0^n) $$ where $k$ is a random key.

The task is to show if this sheme either provides OT-IND-CPA or IND-CPA.

So if I understand pseudorandom perm ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.