Latest Crypto related questions

Score: 0
r s avatar
Pros and cons about padding a cryptogram produced with an "additive" operation mode
ru flag
r s

These days I found myself thinking about the implications of padding or not padding block cipher modes that act like additive stream ciphers (I meant OFB, CTR, GCM etc). Let's call additive modes.

You know, people hooked on crypto tends to be I little bit paranoid... Well, at some point of my ruminations about the pros and cons of padding when using those additive modes, maybe I got found a "cons" that le ...

Score: 2
Can you use RSA in “CBC mode”?
cn flag

Are there any security concerns with using RSA in “CBC mode”?

Specifically: if I use RSA encryption as my block cipher operation, and apply the standard CBC mode operations including a random IV, will the resulting cipher text provide the same level of theoretical security as the underlying RSA problem?

I am only considering RSA on its own. No padding scheme. I know traditionally RSA is insecure ...

Score: 3
In a public-key system using rsa, you intercept the ciphertext c = 15 sent to a user whose public key is e = 5, n = 35. What is the plaintext m?
ec flag

In a public-key system using rsa, you intercept the ciphertext c = 15 sent to a user whose public key is e = 5, n = 35. What is the plaintext m?

In my calculations m=15. But i dont think my calculations are correct

Score: 0
phantomcraft avatar
Encrypting a random block with XTS and XORing into the plaintext: Would this encipherment scheme be secure?
pf flag

I had an idea to make XTS mode parallelizable at CPU level.

Let's suppose I take two AES-256 keys for XTS and encrypt a 512-byte block with this block cipher mode and XOR the output into the plaintext.

Would this encipherment scheme be secure/valid? Would it be safe?

Score: 1
Security of McCallum-Relyea exchange
in flag

I recently learned of the McCallum-Relyea exchange which allows for a method of key escrow without actually transmitting the key.

It was developed at RedHat and is used by the tang and clevis utilities (and further described here) to allow for automated decryption, in particular for an encrypted root partition for Linux machines. So a client machine could only boot and decrypt its disk if it is on a  ...

Score: 1
Bukaida avatar
How to solve this S Box?
cn flag

enter image description here

I have performed the XOR and the result comes as 1001. Now my confusion is that in standard S-Box (DES) the input is 6 bit where the first and last bit together specifies row and 4-middle bits column. Even if I append two zeros on the left making the XOR result 001001, then row 01 does not exist in the problem. If I don't then row 11 i.e 3 also does not exist.

The permutation table again consists of 4-bi ...

Score: 0
Does xoshiro/xoroshiro PRNGs provide uniform distribution?
cz flag

It's not clear from the documentation if the sequence of integers produced by these PRNGs belongs to the uniform distribution.

Also it's look like there is a whole family of RNG algorithms called in a similar manner. Personally I'm mostly interested in xoshiro256** - but no information about distribution uniformity as well.

Score: 0
Soteri avatar
CTR HMAC SHA1 vs GCM Key management
cn flag

The protocol SRTP uses by default AES in CTR mode with HMAC-SHA1. For my thesis I want to research if GCM would be a better option. Therefore I read following discussion.

There the answer was that GCM mode is better among other things because GCM just needs one key for encryption and message authentication and CTR+SHA1 needs two for these things.

But can't I use just one key for CTR+SHA1? Couldn't I reu ...

Score: 0
phantomcraft avatar
What percentage of the keyspace should be brute-forced to find an equivalent key if the block cipher has?
pf flag

I have been reading the Hasty Pudding Cipher specification and the author make clear that the cipher has some equivalent keys if the keyspace is larger than 8192-bits:

Two keys are equivalent if they expand to the same key-expansion
table.  The likelihood is negligible for keys of size < 1/2 the
key-expansion table size, 8192 bits.  For keys longer than this, some
will be equivalent, but there is no  ...
Score: 0
cmplx96 avatar
RSA - is the message a member of the multiplicative group of integers modulo n?
cn flag

As I understand it, RSA works as follows:

  1. Pick two large primes $p$ and $q$
  2. Compute $n = p \cdot q$
  3. The associated group $\mathbb{Z}^*_n$ consists of all integers in the range $[1, n - 1]$ that are coprime to $n$ and will have $\phi(n) = (p-1)(q-1)$ elements
  4. Select the public exponent $e$, which must be coprime to $\phi(n)$
  5. Compute the private exponent $d$ by solving $ed = k\cdot \phi(n)+1$ with th ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.