Latest Crypto related questions

Score: 0
Bondolin avatar
Simple Key Exchange, One Server
gn flag

I am trying to better understand how TLS works. I understand in the normal use case you need various random values generated and used in the key exchange, to prevent some MITM reusing a previous transmission to spoof the server or the client.

However, let us assume some degenerate case where there is a single server whose single public key is already known by its clients as well as various adver ...

Score: 0
Does the signature length of RS256 depend on the size of the RSA key used for signing?
th flag

The following NodeJS code, when run (v16.8.0), logs 512 to stdout.

const crypto = require("crypto");
const { privateKey } = crypto.generateKeyPairSync("rsa", {
    modulusLength: 4096,
});
const sign = crypto.createSign("RSA-SHA256").update("somestringtosign");
const signature = sign.sign(privateKey);
console.log(signature.length); // logs 512

If I change the modulus length to 2048, then 256 is logged  ...

Score: 2
Ievgeni avatar
Size of group elements in a bilinear context
cn flag

In a asymetric pairing context, which size (in bits) should have the elements of $\mathbb{G}_1,\mathbb{G}_2$ and $\mathbb{G}_T$ if we consider the most efficient elliptic curves?

Score: 1
xiaojiuwo avatar
What is the meaning of $F_{p^k}$ and the elliptic curve over it, $E(F_{p^k})$?
cn flag

In pairing based cryptography, there will be the finite field $F_{p^k}$ where $p$ is prime number and $k$ is an integer. The elliptic curve is constructed on that finite field as $E(F_{p^k})$.

For example, let $E$ be an elliptic curve $Y^2 = X^3 + aX + b $ over $ F_{q^k}$. What is the meaning of $ F_{q^k}$ here? I only understand prime fields ($F_q$ where q is a prime number).

Score: 2
What would be an O(n) time adversary for this kind of scheme
et flag

Suppose we have a block cipher $$E:\{0,1\}^k \text{ x } \{0,1\}^{2k} \rightarrow \{0,1\}^{2n} \quad \text{ with } \quad k,n\geq128$$ K is the key generation algorithm that returns a random k-bit key. Let SE = (K,Enc,Dec) be the symmetric encryption scheme with encryption and decryption algorithms as described below in the code. The message input to Enc is an n-bit string, and the ciphertext input  ...

Score: 2
ness64 avatar
Proving a derived MAC is secure via reduction
jp flag

I don't have a very specific question, but reductions have been a weaker suit of mine and I was wondering if there is a secure MAC scheme, and a derived MAC' that uses MAC but modifies it in some way, how could you prove that MAC' is secure via reduction? I know how to do reductions for PRGs and PRFs, but not sure how to use it for MACs. I don't have a concrete example, but a walkthrough of the general  ...

Score: 1
ness64 avatar
What does a deterministic MAC actually mean?
jp flag

Does a MAC that's deterministic mean it uses a PRF? Thanks for the help!

Score: 1
FuzzyChef avatar
Can the salt be derived based on the other components of encrypted data?
at flag

I'm using python.cryptography's Fernet with PBKDF2 passphrase hashing to encrypt a piece of data (the value) that is stored, encrypted, in a database. The hashed passphrase is not stored in the database, and for that reason neither is the salt. Instead, the salt comes from a password vault in the application's runtime environment, and then modified to make it unique per value.

One question I hav ...

Score: 0
Matt avatar
Question about obtaining a keystream from a linear-feedback shift register
ua flag

For a homework question we are obtaining a keystream from a LFSR and I am slightly confused on which digits are used as the key.

For example I have this table here,

b5 → b4 + b1
t   B5  B4  B3  B2  B1
1   1   0   1   0   1
2   1   1   0   1   0
3   1   1   1   0   1
4   0   1   1   1   0
5   1   0   1   1   1
6   1   1   0   1   1
7   0   1   1   0   1
8   0   0   1   1   0
9   0   0   0   1   1
10  ...
Score: 0
Finlay Weber avatar
Are all public key a result of computing g^k mod p
ng flag

I just read through the text book definition of Diffie–Hellman key exchange. And from what i understand, the public key that is shared based on the protocol is calculated from:

g^k mod p

where g is a generator in the multiplicative group, and p is a large prime and k is the private key.

My question is, are all public/private key generated to have this relationship? Or this way of generating the pu ...

Score: 0
Using GP/PARI how would you solve this randomised Elgamal question?
kw flag

I know how to solve this question manually, but I don't know how to solve it using the program gp/pari. It is based on randomised Elgamal

Let p = 739. Given the following ciphertext of some message m1 encrypted using randomized Elgamal, what is the ciphertext of m1 · m2, where m2 ≡ 2 (mod p)? (c1,c2) = (246,609)

Score: 7
Myria avatar
How bad is it to leak $k$ in RSA?
in flag

In RSA using a small public exponent $e$ such as $65537$, how bad is it if the value $k$ leaks? $k$ as in the following equations:

$ed - 1 = k \phi(n)$

or

$ed - 1 = k \cdot \operatorname{lcm}(p-1,q-1)$

Intuitively, this would only reduce the complexity of the breaking the system by $65535$ times, nowhere near enough to matter, though I assume that GNFS would not be improved by knowing $k$.

EDIT: Thi ...

Score: 1
savx2 avatar
Is it possible to partially decrypt an aes-gcm ciphertext?
za flag

Say that I encrypt a large file using aes-gcm and upload it somewhere. Can I then download only the first few blocks (as well as IV and tag) and decrypt them?

If not, is there another authenticated encryption that allows this?

Score: 1
Novice_researcher avatar
Adaptive Security Advantage
br flag

Adaptive model: the attacker can adaptively query the challenger for private keys. The challenge message need not be revealed at the start of the security game

Selective model: the attacker has to declare the challenge message at the start of the security game before he can see the public parameters setup.

How does adaptive security offer an advantage to Adversary in comparison to selective security ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.