Latest Crypto related questions

Score: 2
Quadratic Sieve: Is there a thumb rule for deciding how many numbers to sieve?
et flag

In the Quadratic Sieve algorithm, we first decide on a B & then look for B-smooth prime factors by sieving using a quadratic polynomial.

I can find a few formulas which help figure out how to decide on B.

To factor a number N, we can use the following:

$L = e^{\sqrt {\ln(N)ln(ln(N))}}$

$B = L^{\frac {1}{\sqrt 2}}$

This gives a rough estimate of what smooth numbers we should look for.

However, I am u ...

Score: 2
user2357 avatar
Is it practical to build a symmetric encryption cipher that needs the changing of the "main" key for each plaintext?
us flag

I read about an encryption cipher that needs the changing of the "main" key for the encryption of each plaintext. Sometimes this change depends on the plaintext and is done automatically.

Question: Is it practical to build a symmetric encryption cipher that needs the changing of the "main" key for each plaintext?

[Edit] Some ciphers take some aspects of the plaintext and include it into the key, tha ...

Score: 0
An Ca avatar
Verify encrypted signature using encrypted version of publickey without decrypt them
cn flag

I try to explain the problem (maybe it's trivial): is there a way to do the following: sign a message with private key, send encrypted version of signature and an encrypted version of publickey to verifier in a manner that the verifier can verify the signature without decrypt publickey and signature? Thanx in advance for the answer.

Score: 3
X. G. avatar
Security proof regarding a zero-knowledge counterexample that is secure in the stand-alone model but insecure in the UC model
in flag

Background

The following zero-knowledge (ZK) counterexample is described in Canetti's work [Security and Composition of Cryptographic Protocols: A Tutorial, page 26] to show that there exists some protocol that is secure in the stand-alone model but insecure in the UC model:

Assume there is such a "puzzle system" that both the prover and the verifier can efficiently generate puzzles, and

  • The prover c ...
Score: 0
Gokul Alex avatar
Crypto Economic Attacks such as Nothing At Stake and Sandwich Attack from Archive Nodes on Polkadot
in flag

Could you please advise me if there are threat vectors from archive nodes such as front running attacks, sandwich attacks and nothing at stake attacks as they are quite powerful in terms of the infrastructure and information architecture. How do we prevent scenarios when they become byzantine and become powerful and practical adversaries.

Score: 5
Sean avatar
Pairing-friendly curve whose group order is a safe prime
yt flag

Are there any pairing-friendly curves whose group order is a safe prime?

That is: the order of the group is $2q + 1$ for some prime number $q$.

Or, is it impossible to have such groups?

Score: 0
Encryption using N number of keys (PKI) and decryption using M out of N Keys
rs flag

On a tendering portal, I want to encrypt the value of the submission using N number of public keys (PKI) and later on want to decrypt the same information using M out of N number of private keys (PKI). M<N and sequence of decryption should not matter. Please suggest the algorithm for doing so.

Score: 0
YGrade avatar
Related Key Attack on Schnorr Signature - Why does the challenge include $\psi = g^x$, not $y$?
it flag

The original Schnorr signature scheme suffers from a Related Key Attack (RKA) as described by Morita et al. The authors of this paper then suggest a modification to the signature algorithm to prevent a RKA as follows:

  1. Set $\psi \leftarrow g^x$, where $x$ is the private (signing) key for the scheme.
  2. Set the challenge hash to be $h \leftarrow H(M || r || \psi)$.

The second step above differs from  ...

Score: 0
knaccc avatar
What is the term to describe the combination of ciphertext, IV and authentication tag?
es flag

Authenticated encryption with associated data, such as AES-GCM, will take as input: IV, optional associated data, plaintext and key.

A ciphertext and an authentication tag will be produced.

Is there a frequently used term for this (IV, optional associated data, ciphertext, auth tag) data structure?

I'm looking for a term that ideally would equally apply to the data structure that would contain data enc ...

Score: 1
Joseph Van Name avatar
Are there any estimates for the spectral radius and distribution of eigenvalues for the AES, DES, etc round functions?
ne flag

Suppose that $F:K\times X\rightarrow X$ is a function such that for each $k\in K$, the mapping $F_{k}:X\rightarrow X$ defined by letting $F_{k}(x)=F(k,x)$ is a bijection. Suppose that $F$ is the round function for some cryptographic function such as a block cipher or cryptographic hash function. Let $V_{X}$ be the complex vector space consisting of all tuples $(\alpha_{x})_{x\in X}$ such that $\sum_{x\ ...

Score: 0
HITESH SURYAWANSHI avatar
Designing your own Algorithm
in flag

I have been told to design my own algorithm as a college assignment. What I could have come up with was a random cipher. For example:

Suppose my plaintext is: AND

So I'll take an array the size of my plaintext and keep on storing random values between 0 to 9.

I will use random values and my array becomes {3,5,1}

My encrypted text becomes DSE

I have used a random function for generating random valu ...

Score: 9
hanugm avatar
Is it possible to apply RSA on complex numbers?
de flag

RSA is a popular public-key cryptography algorithm. It has some mathematical assumptions. I mean, one cannot apply RSA on elements of any algebraic structure. Elements from certain algebraic structures are only eligible for utilization in RSA.

I want to know whether complex numbers fall into those particular algebraic structures or not. If no, due to the lack of which property complex numbers bec ...

Score: 2
Question about coefficient of ECDSA in lattice attack
in flag
jin

Update: I made my lattice attack worked finally. As the actual reason is quite complicated I decide to write an answer below to describe how it worked so anyone with similar question might get inspiration from my work. The Question is not modified.

I was studying lattice attack recently. I tried to use data from TPM-FAIL to help me understand this attack and try to implement an attack using "textbook meth ...

Score: 0
algo avatar
How to do the WOTS checksum
us flag

As far as I understand, the Winternitz one-time signature is made by:

  1. Making an array of private keys.
  2. Making an array of public keys by hashing each private key X times, X being the number of different possibilities of characters that can appear in each position of the message (or the hash of the message) to verify.
  3. Making an array of hashes as signature by hashing each private key X minus "the charac ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.