Latest Crypto related questions

Score: 0
Dandan avatar
Secret Sharing in a decentralized network
co flag

Is there a method by which a secret can be split across multiple nodes, such that:

  1. No one node can learn the secret.
  2. An adversary can't learn the secret by bringing up multiple dummy nodes.
  3. Redundancy can be had if one or more nodes in the network fail.
Score: 2
Titanlord avatar
Question about styles of reduction proofs
tl flag

In cryptography security proofs mainly use the reduction proof technique. I now have read a lot of reductions proofs and also did some on my own and I think I understand it pretty well. While reading those proofs I noticed two main styles of such a reduction.

Say we have scheme $B$ based on $A$. We know $A$ is secure. If one wants to proof the security of $B$ by reducing it to the security of $A$ ...

Score: 1
C.S. avatar
Equivalence between search-LWE and decision-LWE
in flag

Are there any constraints when it comes to proving that search-LWE and decision-LWE are equivalent? Should we assume that the module $q$ is prime when switching from one version to another?

Please give a good reference where proof exists.

Score: 1
Hunger Learn avatar
Algorithmic game theory and protocol design for communication
ua flag

There is a field of exchanging information that combines cryptography and game theory. I am interested in understanding this field, but it's a little complex for me. To begin with there is a paper of Barany which shows that instead of having a centralized mechanism of information where a mediator can inform the players about what strategy to follow, the players instead can replace the mediator w ...

Score: 2
Examples of one-way pseudo-random permutation?
fr flag

One-way functions have many candidates such as integer factorization. I am interested in combinatorial one way permutations. Specifically, I am interested in known one-way pseudo-random permutations (ideally a survey paper).

Score: 0
differential privacy over a normal vector
cn flag

We're given a vector $x\in \mathbb{R}^d$ whose coordinates where sampled from a known normal distribution $\mathcal{N}(0, \sigma^2)$.

How should I send this vector while maintaining (local) differential privacy? with some sensitivity over its $\ell_2$ norm (i.e., two close vectors should not be distinguishable). Is there a way to take the fact that we know the source distribution into account?

Thank y ...

Score: 2
Manglemix avatar
How is Argon2 used for key derivation?
us flag

By my understanding, a key derivation is when you take some data, say a password, and use a function to convert it into a number that can be used as a secret key in say elliptic curve cryptography. Argon2 uses a random salt when hashing, which necessitates that the hash is different every time despite the same password being used. If the hash is different, how can it be used to represent the same secret ...

Score: 2
Hunger Learn avatar
Different secret sharing schemes instead of Shamir's?
ua flag

Are there any different secret sharing schemes instead of Shamir's Secret Sharing , that is not based in polynomial interpolation over finite fields? Or is it the most efficient than the others?

Score: 1
AES-CBC Hash Function Collision Resistance
mp flag

I am using AES-CBC as a hash function which is encrypting a block of length n. The blocks, m = (m1, m2, ..., mn). The IV is one block long and the encryption key is length 128, 192 or 256 bits.

Will I get collisions? And if so, how could I find examples?

I expect to find collisions every 2^(n/2) hashes but I don't imagine this would allow me to find any matches in the next 10000000 years.

Score: 0
Zachary Robinson avatar
How can I calculate the unicity distance as a function of the number of bits encrypted?
de flag

I know that the unicity distance of some encryption algorithm with a given key entropy $H_K$ encrypting a message with per-character redundancy of $D$ is $\frac{H_K}{D}$, and that the per-character redundancy $D$ is equal to the difference between the bits in one character of the alphabet used (e.g. 7 bits for ASCII) and those encoded in one character of the plaintext (e.g. ~1.5 bits for standard Eng ...

Score: 1
Johny Dow avatar
Why does Shamir's Trick for RSA Work
fr flag

I have read that Shamir's trick can protect RSA with CRT against fault attacks. However, it is not clear to me why the following equations $$ s_{p}^{*}=m^{d \bmod \varphi(p \cdot t)} \bmod p \cdot t \\ s_{q}^{*}=m^{d \bmod \varphi(q \cdot t)} \bmod q \cdot t $$ imply that: $$ s_{p}^{*} = s_{q}^{*} \bmod t $$

Score: 0
Ronnie1023 avatar
Use HMAC for every block encryption operation
kh flag

Is it possible to use HMAC while performing encryption of blocks?
I think that the main problem with the approach would be to get the same output size as the block, from the HMAC function.
Also, the hash function is one-way, so how would one perform the decryption?
Are there any real-world examples for this approach, or is it not feasible?

Score: 2
A newbie question about NTRUEncrypt: small r(x) and closest vector problem
us flag

In NTRUEncrypt with system-wide parameters $(N, p, q)$, let Bob's public key be $h(x).$

To encrypt plaintext $m(x)$ whose coefficients are small, Alice needs to generate a random $r(x),$ whose coefficients need to be small too, and calculates ciphertext $c(x) = r(x) \times h(x) + m(x) \bmod q.$

It is considered difficult to find $m(x)$ from $c(x)$ and this difficulty is presumably based on the clo ...

Score: 2
Katoptriss avatar
Clarification about the iota function of SHA-3
cn flag

I am trying to implement SHA-3 using this document and have a question about the iota step.

This step consists in a single XOR between the central (0, 0) lane of the state (illustration of the state p.8 if needed) and a round constant. In other terms:

for z in [0, w[:
    let new_state(0, 0, z) = state(0, 0, z) ^ RC[z]

where RC is viewed as a bit string.

The first round constant of the first round is 1, ...

Score: 1
J.Valášek avatar
Multiuser encryption, singleuser decryption
cn flag

I have an hybrid encryption (RSA, AES) for a file sharing project I am working on, where I use a single public key for encryption on the sender side and corresponding private key for decryption on the recipient side. I would like for a sender to be able to send files to multiple users each having only their own unique key pair (public keys would be distributed).

I know this is possible using GPG

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.