Latest Crypto related questions

Score: 4
Julian avatar
Hash function and operation commuting over composition
ca flag

Is there a hash function $H$ and operation $\otimes$, which fulfill the following property?

$$ H(A) \otimes H(B) = H(A \otimes B) $$

$A$ and $B$ are two byte blocks of identical length, if necessary restricted to a fixed length (e.g. 128 bytes). $H$ should be a cryptographic hash function, in particular, it should be pre-image and collision resistant.

Idea

One idea based on a system of equations using  ...

Score: 0
zelda191919 avatar
How can I recover mersenne twister when only the part of the bits?
id flag

https://github.com/tna0y/Python-random-module-cracker Here, when we get 32*624 bits of outputs from Mersenne-twister we can recover Mersenne twister. My question is when we get the parts of the bits, how can we recover Mersenne twister? For example function getrandbits from python random module gives only part of the bits. Is it available to untwist it?

Score: -1
Padding and the MD5 algorithm
cn flag

In MD5, if M=100, how can we perform padding on it and how many blocks are needed in each round?

These are general questions for understanding padding and rounds.

Score: 0
mehdi mahdavi oliaiy avatar
Why is the cofactor of twisted Edwards curve chosen 8?
ro flag

While The cofactor of Edwards curve is chosen 4, the cofactor of twisted Edwards curve is chosen 8. I cant understand this reason. Can we choose cofactor 4 for twisted Edwards curve?

Score: 1
CDH solver algorithm construction
cn flag

If $A$ is an efficient algorithm that solves the Computational Diffie-Hellman problem for $\frac{1}{2}$ of the inputs and returns a special symbol for the rest, how can I use $A$ to construct another algorithm B which solves $CDH$ with a higher probability ($1 -\frac{1}{2^k}$) ?

Score: 0
Steven Wu avatar
Why does RFC 6979 need so many loops?
se flag

I recently started reading RFC 6979. I'm curious why it needs so many loops.

This post asks a similar question: "RFC 6979 - Why not simply hash the message & the private key for deterministic ECDSA?", but my doubts are still unanswered.

Why can't the $k$ used in ECDSA be just like $k = SHA256(sk + HASH(m))$ ?

Is it just because HMAC_DRBG has a better security proof ?

Score: 1
Encryption of small data with fixed key and incremental IV
br flag

I have a Bluetooth device that sends a small package periodically (without receiving). I want to encrypt and authenticate the data using AES-128. It has an embedded random and unique key which is burned to the memory at production and it is known to the receiver. I have the following message structure:

Counter Payload Magic Padding
4 bytes 10 bytes 4 bytes 2 bytes

Counter is not encrypted  ...

Score: 1
YGrade avatar
What security does the BMR protocol offer against corruption?
it flag

I've been conducting some research into general-purpose MPC protocols and have been unable to pinpoint the exact security offered by the BMR protocol. The reference I've been using for the majority of my research is “A pragmatic introduction to secure multi-party computation" by Evans et al., which states that BMR is able to achieve security "against any $t < n$ number of corruptions among ...

Score: 2
Mittal G avatar
Can we combine two true random generators to obtain a new one?
co flag

It is well known that a true random generator exploits the randomness occurs in some physical phenomena. Also, the output of a true random generators can be either biased or correlated. Therefore, de-skewing techniques are required.

My question is that if we have two true random bit generators whose outputs are not passing the test-suite of NIST, can we combine these outputs to obtain a random bi ...

Score: 0
Buddhini Angelika avatar
Checking whether a particular group has an efficient, faithful representation as a matrix group
us flag

There are cryptographic protocols being developed for non-abelian groups. For some protocols it is necessary to know whether the group has an efficient representation as a matrix group (say, a matrix group over a field $\mathbb{F}$).

What should I do to find out whether a semidirect product of finite groups can be represented as a matrix group efficiently?

Particularly, say semidirect products of the fo ...

Score: 1
Swagata avatar
Construction of key recovery attack in O(2^(n/2))
tv flag

I have to construct a key recovery attack on symmetric key encryption using a publicly known permutation $\Pi$ in $O(2^\frac{n}{2})$ time using $2^\frac{n}{2}$ queries to an encryption oracle.

The encryption is done as $ \Pi ( m \oplus K) \oplus K $, where $K$ is the key. Both $m$ and $K$ belong to ${0, 1}^{n}$

I do not know how I can use the queries to do the key recovery attack in that time. I can ...

Score: 2
user3161924 avatar
MS CryptoAPI RC4-1024 vs AES-128?
cn flag

I'm trying to figure out MS CryptoAPI to generate a symmetric key on one computer then an RSA key on another, send over that public key to use to export the symmetric key to that other computer. I'm looking at their example here and it appears to create a session (symmetric) key of RC4 with a bit length of 1024 and then an RSA (AT_KEYEXCHANGE) of 1024 bits. Which then makes me wonder, how does RC4-1024 ...

Score: 0
Chinmay Pant avatar
What is a ciphertext only attack and how OTP is unbreakable using this attack
wf flag

I was wondering that what actually is cipherText-only attack and how the One Time Pad Encryption cant be broken by this attack?

Score: 1
Hormoz avatar
What makes Argon2 also slow?
us flag

So as I understand Argon2 is a memory-hard function, in other words it has to use a certain amount of memory, thus making it effective against GPUs.

So would this in theory, make Argon2 useless against an adversary with infinite memory?

But also if this is the case, then why does giving Argon2 a higher memory requirement also make it slower? Shouldn't it just take the same time but with more memory? ...

Score: 0
For a given security parameter $\kappa$. what does $poly(\kappa)$ mean?
ua flag

Let ($Gen,Enc,Dec$) be an LHE scheme with security parameter $\kappa$ and message space $M$. Assume that a multiplication operation exists in $M$, i.e., is a finite ring. Let $F : \{0, 1\}^s × L → M$ be a pseudo-random function with seed space $ \{0, 1\}^s$ ( $s=poly(κ)$) and the label space $L$.

I understand what $\kappa$ is as the security parameter of the encryption scheme, but I'm unfam ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.