Latest Crypto related questions

Score: 1
Understanding the algebra behind GCM's security
ru flag

I would like to understand the algebra behind GCM's security. Before I ask my questions, let me state my understanding of the math behind GCM. If correct, my questions are at the end; if incorrect, can you please explain my mistake.

For simplicity, assume only one block of ciphertext $c$. We want our tag to have two properties:

  1. $tag_k(c)$ should be a universal uniform hash of $c$: that is, for all

Score: 1
Hunger Learn avatar
What could a_0=s in Shamir's secret sharing scheme represent?
ua flag

What could $a_0=s$ in Shamir's secret sharing scheme represent?

As we already know in a $k$ out of $n$ secret sharing scheme, a secret is split in $n$ parts however only $k=t$ parts (of a polynomial of degree $t-1$) are needed if we want to compute the secret. Suppose that $f$ is the polynomial function such that

$$f(x)=a_{t-1}x^{t-1}+a_{t-2}x^{t-2}+\cdots+a_1x+a_0=s+\sum_{i=1}^{t-1}a_ix^i,\text{su ...

Score: 2
Matthew Layton avatar
How to guarantee that a ZKP was generated honestly?
ng flag

The following extracts were taken from the Zero-Knowledge Proof page on Wikipedia:

In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true while the prover avoids conveying any additional information apart from the fact that the statement is indeed true. The essence of zer ...

Score: 0
swannty avatar
DIY: password key derivation tool using PBKDF2 / HMAC
ru flag

First of all, I don't want to reinvent the wheel, just want to build my own car. Non-product environment; only for fun and entertainment.

The goal is to use a single private (and never published) master password to create unique passwords (token) for each website account (twitter.com, reddit.com, etc.)

Is the following approach consistent with these goals?

Code:

HOST_HASH = SHA512( LOGIN + SERVER ...
Score: 3
New2Math avatar
Can voters be authorities at the same time?
bd flag

There is an encryption scheme where the votes are encrypted with ElGamal and the decryption key is the secret that is shared among the authorities. After everybody voted they publish their part of the secret according to the Shamir tresholding scheme and everybody can calculate the tally.

Is it possible that every voter is also an authority and that a threshold scheme is implemented such that the ...

Score: 1
somenxavier avatar
Public-Key Encryption with Privilege Access: is it possible?
es flag

Let be Alice, Bob, and David three people. They all have public-key cryptographic system: private key and public key.

Is there any way, in some known cryptographic system (RSA, Elliptic Curve, etc.), that satisfies the following three conditions:

  1. Alice, Bob, David don't know private keys from anyone
  2. David could see all encrypted message from and to Alice
  3. David is the only one person which is capab ...
Score: 2
Davies-Meyer block cipher and IV
ls flag

I have three questions regarding Davies-Meyer construction :

  1. What is the name of the underlying block cipher?
  2. How is generated the first input hash value (IV) passed to the block cipher?
  3. What is padded to last original message block?
Score: 0
Hunger Learn avatar
An equivalent definition for shamir secret sharing?
ua flag

Taking into account this paper I will write here a definition that the authors provide.

$\textbf{Definition:}$ (linear secret sharing scheme). A $(t,n)$ secret sharing scheme is a linear secret sharing scheme when the $n$ shares, $v_1,v_2,...,v_n$ can be presented as in Equation $\ref{5}$

$$(v_1,v_2,...,v_n)=(k_1,k_2,...,k_t)H,\label{5}\tag{5}$$

where $H$ is a public $t × n$ matrix whose any $t ×  ...

Score: -1
Help me to solve 3 Pass DiffiHellman protocol
jp flag

I am trying to solve 3pass Diffihellman problem. However, I could not solve it. Is there any specific rule exist to select a1 and b1 or problem in the calculation. Please help me to solve this problem. enter image description here

enter image description here

Score: 0
RC4: Known plaintext key, unknown key derivation
co flag

I am working with an older piece of software that generates encrypted backups that I'd like to decrypt. I have a plaintext key, a few examples of encrypted data and I'm pretty sure the data is ASCII, but I don't know how they derive the RC4 key from the plaintext key.

How would I go about testing key derivations comprehensively? The space must be relatively small, even if I'm considering all the  ...

Score: 1
Is this simple Proof of Work algorithm based on SHA256 susceptible to length extension attack?
us flag

Each block's contents are hashed into 32 bytes using $\operatorname{SHA-256}$ (call this string $a$). In order for the block to be accepted, there must be a 256bit nonce (call this string $b$) provided such that $\operatorname{SHA-256}(a\mathbin\|b)$ ($a$ concatenated with $b$) has $N$ or more leading zero bits, where $N$ is a difficulty parameter.

Is this simple Proof of Work algorithm based on  ...

Score: 0
Xavier avatar
Decryption of an El Gamal re encryption mixnet
cn flag

I have interest in e-voting and am currently trying to understand El Gamal re-encryption mixnet.

I understand how El Gamal encryption works and how mixnet works but what's not cristal clear for me is how the decryption is done after the re-encryption.

As I understand it, I just need the secret key to decrypt the encrypted vote that went through the mixnet but I can't find any sources that gives me a ...

Score: 0
Hunger Learn avatar
How many combinotaion of all $n$ players are needed to reconstruct the secret in a $(k,n)$-treshold secret sharing scheme?
ua flag

In a $t+1$ out of $n$ secret sharing scheme where there is a network of $n$ players, in order to reconstruct the secret $t+1<n$ players are needed to share their parts $(x_i,f(x_i))$ so as the polynomial function of degree $t$ can be computed. However, all the $n$ want to have acces to this secret, but at least $t+1$ out of $n$ are needed for the computation. How many combinations are needed amon ...

Score: 1
9337.5p3ak avatar
SHA-256 Hash Crack
id flag

Suppose, If a SHA-2 hash does get broken completely with hardly any power, where would it get reported and is there currently a bounty on it?

Score: 0
Hunger Learn avatar
Secret sharing questions
ua flag

I would like to make a few questions about Shamir's secret sharing scheme and. To begin with, I am starting with the next theorem that determines the intuition of the whole theorem.

$\textbf{Theorem:}$ Let $p$ be a prime, and let $\{(x_1,y_1), . . . ,(x_{t+1},y_{t+1})\}\subseteq\mathbb{Z}_p$ to be a set of points whose $x_i$ values are all distinct. Then there is a unique degree-$t$ polynomial $f$ ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.