Latest Crypto related questions

Score: 1
Foobar avatar
Pairings for Beginners: Pohlig–Hellman attack time complexity
fr flag

I'm reading Pairings for beginners by Craig Costello.

I'm trying to understand this example of (what I think) is the Pohlig–Hellman algorithim (on page 31 of the book).

Consider $E/\mathbb{F}_{1021}\,:\,y^2=x^3+905x+100$ with group order $\#E(\mathbb{F}_q)=966=2\cdot3\cdot7\cdot23$ and generator $P = (1006,416)$. We are given $Q = (612,827)$ and we seek to find $k$ such that $[k]P = Q$. Rather than see ...

Score: 1
eternalmothra avatar
What exactly is a game, challenger, and adversary?
cn flag

Here is my understanding of the concept of security games. I bolded some parts that I am not sure about.

A cryptographic object is formally defined by its algorithms and what security notions it achieves. Such notions capture an adversary’s power and show how the adversary may "break the cryptosystem". "Breaking a cryptosystem" means winning a GAME associated with the cryptosystem’s security. ...

Score: 2
Dotman avatar
Two untrusting people want to come up with a random number
cn flag

Two people want to come up with a random number. They don't trust each other nor any third party. What are the known solutions to this problem?

I am a quantum cryptography student and am currently working quantum random number generation. Any solutions, either classical or quantum are welcome.

EDIT

Ok so here's what I understood by reading through some papers. Assume two mistrusting parties want to com ...

Score: 2
Ievgeni avatar
Is OFB-mode a stream-cipher?
cn flag

I've seen that OFB is considered as a block cipher mode. But could we consider it also as a family of stream cipher?

Score: 2
Ottotinne avatar
Modulo p in Elliptic Curve Cryptography
vn flag

To carry out Elliptic Curve Cryptography between parties, are all elliptic curve equations considered to be in the form $\bmod p$?

For example, the $secp256k1$ Bitcoin curve of the equation $y^2=x^3+7$ uses $\bmod p$, where $p=2^{256}-2^{32}-977$.

Score: 1
Which application protocols use elliptic curve key recovery?
cn flag

Section 4.1.6 of https://www.secg.org/sec1-v2.pdf describes a technique for recovering public keys from ECDSA signatures.

I guess Ethereum uses this. Like if you want to validate a particular transaction I guess you recover the public key and then verify that it matches the "address".

My question is... are there any other protocols that make use of this technique?

Score: 2
Cyclic codes as ideals of a quotient ring
jp flag

I'm finding the algebra behind cyclic codes somewhat tricky. The starting point is easy enough: $C\subseteq \mathbb F_q^n$ is cyclic if any cyclic shift of a codeword $c\in \mathbb F_q^n$ is still in $C$. Then I got hit with this: cyclic codes correspond to the ideals of $$\mathbb F_q[x]/(x^n-1). $$ Now, I have some background in abstract algebra, mostly from group theory. I can recognize a ring and ...

Score: 2
Benefits of hashing a particular seed in a PRNG
il flag

This question is linked with this question (stackoverflow) where I asked about a specific implementation detail of Python's random number generator (Mersenne Twister). Here, I have a slightly different focus. Feel free to close, but I could not find a similar question which exactly answered my question

  • In a PRNG what would be the benefit of hashing a particular seed (user provided)?
  • Would there b ...
Score: 1
Where can I find the source of the Coppersmith method univariate in C with GMP library?
mn flag

Could someone please tell me where I can find the source code of the Coppersmith method univariate written in C with the GMP library?

to be fair I will explain how I will use it for factoring

reference https://www.academia.edu/48848013/Lepore_Factorization_nr_88

Let's take the example N=1763 of Factorization nr 88 Part I

$P=27*b+1$ ; $p=65-8*b$

$Q=25*a+11$ ; $q=67-8*a$

$p^2=(65-8*b)^2=64*b^2-1040*b+42 ...

Score: 4
Can a service provide a hash/encryption key to others that it itself cannot use?
cn flag

Consider a service $S$ that receives hashes of documents from a number of providers. If two hashes match, it notifies the providers. We do not want anyone at the service to be able to identify the documents. However, the document space is actually quite small (~billions) so a dictionary attack is possible.

One solution would be the creation and provision of an HMAC key out of band between the data pr ...

Score: 1
Bob avatar
Is curve25519 faster than spec256k1 on point multiplication?
cn flag
Bob

Suppose $G_1, G_2$ are the base points on curve25519 and spec256k1, respectively. Point multiplication means to compute $kG_1$ and $kG_2$.

Then which curve is faster?

Score: 2
Foobar avatar
Why is the set of r-torsion points isomorphic to $\mathbb{Z}_r \times \mathbb{Z}_r$
fr flag

I'm reading "On the implementation of pairing-based cryptosystems".

It states that $E(\mathbb{F}_{k^q})[r]$ is isomorphic to the product of $\mathbb{Z}_r$ with itself. $E(\mathbb{F}_{k^q})[r]$ is the set of $r$-torsion points, which means all points, $P$ where $rP = O$ (I think).

Ok. Let's test this with $r = 2$. We know, the 4 solutions are: $\{O, (a_0, 0), (a_1, 0), (a_2, 0)\}$ where $a_n$ is t ...

Score: 0
Zero avatar
Alternative to physical aspect of security
gf flag

To answer my question, imagine a device that has some sort of secret(s) (stored on a crypto coprocessor), that is encrypted with some sort of symmetric encryption (like AES).

If to make this device secure, I would keep the key separate, in a smart card for example.

Then when the smart card is inserted into the device, I would input the PIN of the smart card to allow the device to read the key on the ...

Score: 0
Mark avatar
Masked RSA/BigInt Arithmetic?
ng flag

Masking is the process of replacing operations (internally to some cryptographic algorithm) on intermediate values with operations on secret shared values. Then, even if some number of these secret-shared values leak (say due to various side-channel attacks), one can maintain security (due to the information-theoretic security of the secret-sharing scheme).

I'm interested in the possibility of mask ...

Score: 3
cryptobeginner avatar
Can two different hash function create two unlinkable `ed25519` keys from the same randomness?
cn flag

Assume the following scenario:

  1. Alice has access to 32 bytes of true randomness $s$.
  2. Alice hashes $s$ with SHA-512, and uses the resulting hash as the secret $d_{A}$ for Ed25519. Assume number-clamping and so on are correctly implemented.
  3. Alice hashes $s$ with a different hash function, say BLAKE-2, or hashes $s$ two times with SHA-512, and uses the result as the secret key $d_{A'}$ for Ed25519.
  4.  ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.