Latest Crypto related questions

Score: 0
george s avatar
how to break AES
gb flag

why is breaking a (asymmetric) 1024 bit RSA key less difficult than breaking a 128 bit (symmetric) AES key? Breaking RSA key involves finding the prime factors of a large number. What is involved in breaking an AES key?

Score: 1
Ashwin avatar
Why can't we have AES512 or more?
jp flag

Look I know AES256 is ridiculously secure but to keep aes secure even after quantum computers, I have a concern.
Using the Grovers theorem aes can be reduced from 256 to 128 bits for brute force attack which is also pretty strong but I don't want to be limited to it
Is it (atleast in theory) possible to implement aes512, aes1024, etc...
I mean what's stopping us like for 128bit aes we use 10 rounds of ...

Score: 0
Nav89 avatar
Example of exchanging information
cd flag

I am searching for a simle model that can simulate the following procedure.

Suppose that $i$ and $j$ are two agents that each one obtains her state dependets signal $s_i(\omega)$ and $s_j(\omega)$. After observing their own signals with probability $1$, they do not know anything about the signal that the other agent has, but they do know the common prior $\pi$ about the signals, s.t. $\pi:\Omega\to \D ...

Score: 0
krystof18 avatar
How to ensure the data comes from verified source without using asymetric encryption
ag flag

I'm building a project that is remotely controlled using LoRa and I want to ensure, that nobody can imitate my transmitter and send packets to my receiver. Just encrypting sent data is not enough since someone can receive for example packet that opens the door and sent the same one from his transmitter. How do I make it so only I can send authorized packets? Another problem is that it's really likely th ...

Score: 2
Ordinary avatar
Reconstruction of shamir secret shares in the presence of malicious parties
sy flag

Suppose we have a (t,n) Shamir-secret sharing scheme. A value of some computation is shared with n parties where at most $t-1$ parties are malicious. What is the best strategy to reconstruct the shares? I believe we can use Reed-Solomon error corrections to retrieve value for upto t<n/3. For t<n/2, we can randomly reconstruct $k$ times using $t$ shares and check for the value that appears the most n ...

Score: 0
Rabin Cryptosystem: Chosen-Ciphertext Attack
jp flag

I read in literature that Rabin Cryptosystem can be broken using chosen-ciphertext attack. It is described that after chosen ciphertext is decrypted attacker can factorize public key $n$ by using square root with probability of $1/2$. But in article it is not described how this factorization is done.

If somebody can give some example I would be grateful.

Score: 2
Should I normalize adversary's advantage in IND-XXX Game?
bd flag

The Cryptography made simple (page 207, under Fig 11.12)(Nigel Smart) say that adversary's advantage of IND-PASS Game is $Adv1 = 2\times|Pr[b=b']-\frac{1}{2}|$.
The reason for multiplying by 2 is to normalize advantage from $[0,\frac{1}{2}]$ to $[0,1]$.

But in this paper (page 5, line 9), the advantage of IND-CKA Game is $Adv2 = |Pr[b=b']-\frac{1}{2}|$ which is not normalized and scale is $[0,\frac{1}{2 ...

Score: 2
N Tirumala Rao avatar
Program to find the inverse of polynomial
mx flag

Can anyone tell me how to find the inverse of a given polynomial using python programming? Ex: input given is to find the inverse of (x^2 + 1) modulo (x^4 + x + 1). the output should be : (x^3 + x + 1).

Score: 3
S.Abbe avatar
Question about white-box rsa algorithm
bd flag

I found a scheme for white-box RSA. It seems to protect the input and output of modular operations.
I'm curious about how to analyze the security of this solution.
Does anybody know anything about it?

Score: 2
Shortcut to working out Diffie-Hellman Key Exchange
cn flag

I am trying to calculate Alice and Bob's shared key by hand without the use of a calculator as I feel this is an important trait when progressing into cryptography.

I understand you can use the square and multiply method however we are being taught a shortcut method which I don't quite understand fully.

Question Example:

Alice and Bob use the DH protocol with p = 19,g = 2 and secrets a = 6 and b =  ...

Score: 0
Faking Pedersen Commitment
in flag

Today, I found a website for Pedersen commitment scheme; however, the generators g and h are not independent and therefore a prover can open a commitment c into many ways. I computed the commitment c for a message m and a randomness r (assuming that I know s):

c  = g^m * h^r 

   = g^m * (g^s)^r 

   = g^m * (g^(s * r))

   = g^(m + s * r) 

Say, I have committed to the message m, randomness r, and the c ...

Score: 1
What is the difference between "Elliptic Curve Function" and "Hash Functions" like SHA256?
hk flag

I am reading about bitcoin and I am a little confused about "elliptic curve function" and "SHA256". Do they have the same properties? Can both be used to generate private and public key pairs?

Score: 1
Ordinary avatar
How to speed up Shamir secret share generation?
sy flag

Let us say we have to generate Shamir's secret share for n data points. Is there a way to speed up the implementation apart from using Horner's rule for the polynomial evaluation?

Score: 0
se718 avatar
Perfect secrecy of the reverse of a crypto system that has perfect secrecy
in flag

I am trying to solve a problem that reads as follows:

Let $E_1 = (\text{Gen}_1, \text{Enc}_1, \text{Dec}_1)$ be a crypto system that has perfect secrecy. Denote the message space $\mathbb M_1$, the key space $\mathbb K_1$ and the cyphertext space $\mathbb C_1$ ($\mathbb M_1=\mathbb C_1 = \mathbb T, \mathbb K_1 = \mathbb K$). Let $E_2 = (\text{Gen}_2, \text{Enc}_2, \text{Dec}_2)$ be a crypto system ...

Score: 1
Umbral Reaper avatar
Is Diffie-Hellman less secure when A and B select the same random number?
in flag

I understand that it is feasibly impossible for A and B to select the same random number, given the large input space, but what if it does happen? Does it effect the security of the key exchange? Can an attacker determine that the same keys were chosen?

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.