Latest Crypto related questions

Score: 1
filter hash avatar
The security of DDH with multiple instances?
cn flag

Let $G$ be a finite group of prime order $p$, and $g$ a generator of $G$. The standard DDH is hard to distinguish two distributions $$ \{ (g, g^a, g^b, g^{ab}) : a, b \leftarrow \mathbb{Z}_p\} \text{ and } \{ (g, g^a,g^{b}, g^r) : a, r \leftarrow \mathbb{Z}_p\}. $$

Is still secure DDH with multiple instances? That is, is hard to distinguish two following distributions? $$ \{ (g, g^a, g^{b_i}, g^ ...

Score: 1
Authentication by Presenting the Symmetric Key over an Encrypted Channel
br flag

I have devices which need to communicate with a server over a mutually authenticated and encrypted channel. Authenticating the server is relatively easy, since I can embed the CA certificate in the device firmware and check the signature of the server's certificate. The problem is to authenticate the device to the server.

Normally I could sign the device's certificate as well, but there is no tru ...

Score: 0
Manc avatar
RSA use prime p as public exponent
in flag

I've got two 1024 bits prime $p$,$q$,and $n$ = $p$ * $q$. now I know the result of $ c^{p} \quad mod \quad n = x$,also the value of c is given, I wonder if it is possible to factorize $n$.

Score: 0
caveman avatar
Hashing functions that allow to walk back to parts of cleartext?
in flag

Say $m$ is some clear text, and $h_n(m)$ is its $n$ bits hash.

The question: How can we design $h_n$ so that we can extract maximum information about $m$ from $h_n(m)$?


The reason I ask this is because, I think, if we answer that question, we will identify the perfect lossy compression function.

And the reason I think that's so, is because every bit of the $n$ bits in $h_n(m)$ contain information about e ...

Score: 0
How does one construct a SNARK circuit for proving the knowledge of a SHA256 pre-image?
us flag

Usually one explains how the R1CS/QAPs and SNARKs work using examples of circuits with multiplication and addition nodes, and constructing polynomials from that is relatively straightforward. SHA-2 hashing uses complicated bit-wise arithmetic applied to itself multiple times, not simple multiplications and additions. How does one even construct a circuit to prove that a string hashes to a hash? Is there ...

Score: 0
rozi avatar
In RSA signing find n from e and many pairs of m and c
es flag

When signing using RSA with $e = 65537$ and many pairs of m and c, where $$c^e \bmod (n)=m$$ is there a way to find n (n is 2048 bits)?

I planned on computing $ c^e-m $ and then treating those as a basis for a lattice. But $c^e$ was too large.

Score: 0
Cronos avatar
Can we determine the size of n-bytes before encryption by AES-128?
sk flag

I am writing a program in python to encrypt files. This program takes subsequent 1024*1024 (1 mebibyte) chunks of data from a file and encrypts it using AES-128. This is performed in a loop until all the data in the file is encrypted. The issue is that the size of each 1 mebibyte of data is increased when it gets encrypted.

What I need is a way to determine the new chunk size for each 1 mebibyte  ...

Score: 1
jessica Hu avatar
What's the difference between Optimal ate pairing and R-ate pairing?
us flag

I compare the algorithm description of Optimal ate pairing and R-ate pairing, it turns out to me that the formulas are the same. So I'm a little confused, what's the difference between them? or is it just I misunderstand? Thanks very much.

enter image description here

ref: Beuchat J L, González-Díaz J E, Mitsunari S, et al. High-speed software implementation of the optimal ate pairing over Barreto–Naehrig curves[C]//Internationa ...

Score: 1
nisc avatar
Matching accounts across multiple data leaks via their hashed passwords
it flag

I've heard about several instances where OSINT researchers were able to match user accounts from multiple data leaks purely based on their hashed passwords, assuming accounts had the same password on different sites. (Yes, even when there were no other identifying characteristics, such as re-used usernames, re-used email addresses, browser fingerprints, or IPs.)

As far as I know, these data leaks  ...

Score: 1
How to calculate the order of secp256k1?
co flag

The elliptic curve secp256k1 is defined as $y^2 = x^3 + 7$. The prime for the field is set to:

p = 115792089237316195423570985008687907853269984665640564039457584007908834671663

So now, one should be able to calculate the order by using the Schoof's Algorithm. There is a Python implementation provided here: https://github.com/pdinges/python-schoof

However, it seems to be too time consuming to calcu ...

Score: 1
John Sohn avatar
Crypt-analysis for finding information hidden in images?
cn flag

I was wondering if anyone is familiar with any historical aspects (as to whether someone was able to) for discovering code using images on the web as a transport method ? As in hiding byte values in pixel data broken up between the component values ?

** Edit** Answer below adds to a good search tree of how hide text but doesn't relate to discovering the ciphertext.

Score: 2
J.Doe avatar
A query regarding SHA256 output hash structure vs input entropy?
br flag

Given an Input string of N bytes where some bytes positions in the string are fixed/immutable (F Bytes) and rest of the bytes positions can contain any value as we want or are configurable/variable (V = N-F Bytes).

SHA256(SHA256(N)) = H (256 bits).

Now, Given an Input string of N bytes, the values of N, F, V and the positions which can change and which can't:

How do we calculate the probability/formula ...

Score: 0
How to find k evenly-distributed elements from the set of all n! permutations over n alternatives?
lr flag

Let $C=\{ c_1, c_2, \cdots,c_n \}$ be a set of $n$ alternatives and $T$ be the set of all strict complete orderings on $C$. For any two $t_1$ and $t2$ in $T$, their (Kendal-tau) distance $d(t_1, t_2)$ is defined as the number of pairwise disagreements between $t_1$ and $t_2$.

My Question: How to find $k$ (much smaller than $n!$) different elements from $T$ such that they are "evenly ditributed" in  ...

Score: 0
librehash avatar
Can knowledge of algorithm be used to reduce anonymity?
us flag

This is a bit of a crazy hypothetical, but I think it best illustrates what I'm looking to ask.

Scenario + Question

There's a distributed & decentralized cloud storage network that's starting to get popular. One thing people like about it is the fact that it allegedly grants users tons of privacy they can't get from alternatives like Dropbox.

The company's technical docs state that their so ...

Score: 0
Jack avatar
Semantic Security Game
cn flag

I need help understanding semantic security, in particular, the part on the 'game'.

But first, from my understanding, is semantic security is a 'weaker' and more flexible way to determine that a cryptographic function is secure enough for use? I understand that the definition for perfect secrecy is often too rigid and hence semantic security gives some leeway in defining something that's secure e ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.