Latest Crypto related questions

Score: 1
Luigi2405 avatar
Is there a robust Identity-Based Digital Signature algorithm?
cn flag

I'm looking for a IB-DS algorithm in the web. I found this one (if you know some other let me know). But I cannot figure out what the "identity" is. Better: I don't know if, in the section Key Generation, the $x$ is the identity. E.g. $x = H(EncodedBiometrics)$ (biometrics or any information publicly and inherently linked to the user) for some CRHF $H$. Can you confirm this or am I completely misunde ...

Score: 2
Red Sun avatar
Combining ECC and AES for a Web Chat system
us flag

I am working on a portable secure chat via desktop or mobile, which adopts OTP plus asymmetric encryption. The idea goes like this:

Suppose that Alice and Bob are clients, and the server is run by Steve. Steve generates the server private/public key pair, while Alice and Bob generates their client key pairs`. For each message, the client generates a random AES key for encrypting that specific me ...

Score: 1
How to cryptanalyze the message using permution cipher
cn flag

The message is: ACAUI MMGRC AILEE HKREG EAISW OSTHDS

With a grid size of 6 x 6. The forbidden cells are in different rows and different columns, so there are no two forbidden cells in the same line.

Score: 7
einsteinwein avatar
Difference between Generic Group Models
st flag

I'm trying to understand the difference between the (classical) Generic Group Model as it is described by Shoup [Shoup] and the somewhat restricted Generic Group Model as it is described by Schnorr and Jakobsson in [SJ00]. For clarity, I'm going to give the definition of the two models. For that, I'm using the explanations of the Paper [BL19]. In both settings, we have a multiplicative cyclic group ...

Score: 2
Does having CDH oracle breaks El-Gamal signature scheme?
ca flag

Having a oracle that solves Computational Diffie-Hellman problem which for given values $(g, g^a, g^b)$ outputs $g^{ab}$, is it possible to forge a signature in El-Gamal (wiki) signature scheme?

Score: 2
fgrieu avatar
Names and games for security properties preventing substitution of signed message by the signer
ng flag

Some signature schemes, notably ECDSA, unwillingly allow users to prepare their public/private key pair as a function of two arbitrary messages of their choice, and compute a signature that checks for both messages¹. In the case of ECDSA, the public/private key pair is fully functional, and can sign normally, including for making a certificate signing request for it's public key. Convincing a third par ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.