Latest Crypto related questions

Score: 5
Ordinary avatar
Can an authenticated encryption scheme detect if wrong key is used?
sy flag

Can an authenticated encryption scheme (like AES-GCM) detect if a wrong key is used for decryption? If not, what is the standard way to check whether the entered key is indeed correct. I presume KCVs can be used for this but does this somehow leak any information about the key?

Score: 2
DocWriter avatar
What's an algorithm for laypeople to make personal passwords
bo flag

I'm going to be teaching an audience about algorithms. I'd like to give them one to create unique personal passwords for websites.

  1. They could start with the domain name of the site and their own secret "word".
  2. The algorithm would be simple enough to memorize. Failing that, they could sketch out my flowchart on the back of a business card or something else that fits in a wallet.

There are similar q ...

Score: 1
What are the lower computation and memory cheap fractal symmetric encryption algorimths?
uz flag

I would like to know about encryption schemes that are based in Fractal theory, while they have decent security and are pretty fast.

Score: 3
Chirag Parmar avatar
Why is confusion and diffusion never talked about in asymmetric crypto?
cn flag

While talking about symmetric encryption schemes like AES we always have a goal of achieving confusion and diffusion. But when it comes to asymmetric encryption schemes like RSA, DH etc. we never talk about diffusion and confusion.

Is it known that modular arithmetic and prime arithmetic ensure confusion and diffusion?

Is there any literature that dives into the information theoretic analysis, in te ...

Score: 5
NB_1907 avatar
Post-quantum algorithms and side channel attacks
us flag

I am studying finalist algorithms of NIST Post-Quantum Cryptography Standardization. I noticed that almost all third party cryptanalysis papers consist of side-channel attacks. Why are classical cryptanalysis methods -algebraic, mathematical attacks etc.- more effective on classical algorithms than post-quantum algorithms?

In addition, I know that mathematical problems behind post-quantum algorit ...

Score: 0
Novice_researcher avatar
KP-ABE Key Generation
br flag

In Key Policy Attribute-based encryption if we need a targeted broadcast where the set of attributes are the same for a group of users. It means they all share the same secret key right? Or is it that every user needs to have at least 1 attribute value different from all other users.

Example: If I need to encrypt a message to everyone who is a researcher in CS then attribute= researcher dept=CS.  ...

Score: 3
user77340 avatar
What does the bounded storage model mean?
ie flag

In the bounded storage model, it assumes the storage of the adversary is bounded or limited, and thus it is possible that we can achieve a kind of cryptography without relying on hardness assumption. But what does it mean by "bounded storage"? Should it assume the length of the message is always too long for any computer on the earth to store? So can I conclude that the cryptographic scheme that replies ...

Score: 2
Alexander D'Attore avatar
Node.js uuid.v4 vs crypto.randomUUID. Which implementation is more cryptographically secure?
cn flag

For a long time I've used the uuid npm package for my v4 uuid needs. It seems in recent versions of node they have introduced a built-in crypto module with the method randomUUID.

Some benchmarks have been done to show crypto.randomUUID is much faster than uuid.v4 (roughly 3x +).

However I can't find any information about how the implementations differ (if at all) in terms of how they choose random num ...

Score: 1
What are the expected values of a particular rotational-XOR property of a sequence of random bitstrings?
de flag

Assuming that $x$ is a sequence of $l$ bits and $0 \le n < l$, let $R(x, n)$ denote the result of the left bitwise rotation of $x$ by $n$ bits. For example, if $x = 0100110001110000$, then $$\begin{array}{l} R(x,0) = {\rm{0100110001110000}},\\ R(x,1) = {\rm{1001100011100000}},\\ R(x,2) = {\rm{0011000111000001}},\\ \ldots \\ R(x,15) = {\rm{0010011000111000}}. \end{array}$$

Let $A \oplus B$ denote th ...

Score: 0
kabibe sadagat avatar
How does AES-256 works if AES is only a 128-bit block cipher?
ly flag

I'm currently studying AES encryption and I'm quite confused on how do we use a 256-bit key in AES?

Becuase in my understanding, AES no matter what the key size is, it still operates and encrypt a 128-bit block of message only in the whole cycle/rounds until it reaches the end.

well for AES-128 we use a 128-bit key that is total of 16 byte char, and that can be represented by a 4x4 matrix, and most  ...

Score: 0
Novice_researcher avatar
IBE for Access Control
br flag

What makes IBE (Identity-based Encryption) unsuitable for Access Based mechanisms? What are the attempts made for using IBE for access control?

How does the concept of ABE (Attribute-Based Encryption) sort out the issue?

Score: 3
TheJonaMr avatar
No Final subtraction in Word-level Montgomery Multiplication
tr flag

I am trying to make an RSA module in VHDL, which in turn will be deployed to an FPGA. I am trying to implement a full Montgomery algorithm which means that I am working with the Montgomery Exponetiation algorithm, and the Montgomery Multiplication algorithm. Mostly my tests consists of generating random numbers (keys, modulus, r, messages) that I use to perform encryption/decryption. If the original mes ...

Score: 0
Ordinary avatar
Does hash-then-sign provide confidentiality?
sy flag

Suppose I use the hash-and-sign paradigm and reveal a signature on the message digest $\sigma(H(m))$. Would just revealing this signature violate message confidentiality (assuming H is one-way and collision resistant)?

Score: 1
Which passphrase length is good so it's hard to break bitcoin's PBKDF2 key?
ru flag

According to https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki#From_mnemonic_to_seed

To create a binary seed from the mnemonic, we use the PBKDF2 function with a mnemonic sentence (in UTF-8 NFKD) used as the password and the string "mnemonic" + passphrase (again in UTF-8 NFKD) used as the salt. The iteration count is set to 2048 and HMAC-SHA512 is used as the pseudo-random function. The le ...

Score: 0
Ordinary avatar
Is there a way to ensure that the signer has generated a valid (message, signature) pair without seeing the message?
sy flag

Suppose Alice sends message $Enc(k_{AB}, m)$ to Bob where $k_{AB}$ is the common symmetric key. Next Alice sends a signature of $H(m)$ $\sigma_{sk_A}(H(m))$ signed under her private signing key $sk_A$ to Eve, where H is a secure hash function. Then, Bob decrypts the message and sends it to Eve where she verifies it with the signature. Here, either Alice or Bob can be malicious. If Bob is malicious, he g ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.