Latest Crypto related questions

Score: 1
Cisco Saeed avatar
How to use Double Compression point with scalar Double-and-Add in Elliptic curve
pl flag

refer to this paper Khabbazian Paper I am trying to use double point compression in scalar for example double-and-add with k=27 which need to reduce the multiplications process for example scalar double-and-add algo consumes 4 doubling and 3 addition for P1(3,10) based on this example example

I am thinking to take two points P1(3,10) P2(7,12) and compress to get P3(x1,x2,y1+y2) P3(3,7,22)which will be ...

Score: 1
qingqingthe avatar
Question about Secure Multi-Party Computation
ro flag

I am doing research about Non-interactive Secure Multi-party Computation and encounter a dilemma that I am not quite sure if it is possible and wonder if there are better thoughts that could help.

Situation:

There are $n$ parties ($i \in [n]$) and a dealer. The dealer has a number $U$ and weights $w_i (i \in [n])$ and parties have their inputs $x_i$. Now the parties would like to calculate $U - \su ...

Score: 2
constantine avatar
A problem about matrix
cn flag

enter image description here

I have an idea but I don't know if it will work. For the appropriate $p$ it is easy to find $n$ linearly independent $x_i$. Then we compute the inner product between the $x_i$. I think the information is enough to recover the $\boldsymbol{v_1},...,\boldsymbol{v_n}$, because, by matrix it can be written as $\boldsymbol{X}=\boldsymbol{T}*\boldsymbol{V}$, where $\boldsymbol{T}\in \{-1,1\}^{n \times  ...

Score: 1
librehash avatar
Question about Security of Multi-Signature Scheme
us flag

I am a developer trying to follow best practice guidance as established by the IETF for my applications. I was researching standards for ECDSA key generation for some work that I have to do in the blockchain industry.

I am tasked with creating a unique, less complex zero-knowledge based scheme.

RFC Draft Indicating Deterministic ECDSA + EDDSA Signatures Were Still Insecure Without Supplemental Acti ...

Score: 1
Des_lat avatar
Elliptic curve ElGamal cryptosystems
sm flag

I have been working through a book on cryptography and have recently come across elliptic curves. This particular question has me stumped and the book isn't much help, unfortunately. I was wondering if someone was able to talk me through the process a little better. The question is:

Alice and bob use

  • the prime p=83,
  • an elliptic curve E: y^2 = x^3 + 5x + c (mod 83),
  • and point P=(3,11) on E.

Alice chose ...

Score: 1
Arqwer avatar
Is it possible to securely encrypt some text with password without a computer?
pl flag

Encrypting text with a computer has problems: we need to worry about hardware backdoors in processors, motherboards, and extension cards, software backdoors in OS, vulnerabilities in software, and viruses.

Computers are so complex that no single person knows every detail of how they work. It makes it impossible to examine every single part of hardware and software, so we can only hope that the co ...

Score: 1
Can the IV be reused if the key is changed?
in flag

I am using AES-GCM-256 to encrypt data in a database, and am using a single key that I salt with a unique random value for each user to encrypt their information. I am using the same IV for all of this.

Is this secure so long as I change the key each time?

Score: 1
TECH HINDER avatar
Which encryption algorithm should I use for encrypting a string
tk flag

I have a very important string it's of around 20-40 words. I want to encrypt this string and store it online . Which encryption algorithm will be useful for me.

Score: 2
If SNARKs generally work in finite fields, how are non integer values handled - say fixed point decimal numbers?
et flag

In Vitalik Buterin's write-up on SNARKs Quadratic Arithmetic Programs: from Zero to Hero, he writes

Note that the above is a simplification; “in the real world”, the addition, multiplication, subtraction, and division will happen not with regular numbers, but rather with finite field elements

I assume SNARKs are used in blockchains to hide & also verify the transactions. However, blockchain t ...

Score: 2
Benjamin avatar
Fusion auth versus jose4j library for jwt using secp256k
pa flag

I am a beginner in-terms of JWT libraries in programming.

How the keypair used (secp256k1) is related with the algorithmic header used for creation of JWT?

And why authfusion doesn't need an algorthmic header as such JWSAlgorithm.ES256K (nimbus library) or AlgorithmIdentifiers.ECDSA_USING_SECP256K1_CURVE_AND_SHA256 (jose4j 0.9.0)?

I am confused with these relations, please shed some light over it.

 ...
Score: 3
Des_lat avatar
Solving Shamir secret sharing schemes
sm flag

I have been working through the introduction to cryptography with coding theory book and have just come across Shamir secret sharing questions. However I just don't quite think I'm understanding it correctly. The question states:

In a (2,19) Shamir threshold scheme working in modulo 41, there are two shares (2,14) and (4,25). Another share is (3,x) where x is unreadable. Find x, the polynomial and  ...

Score: 1
Archies avatar
Proving that the length-preserving OWF does not have polynomially bounded cycle
in flag

Here a cycle is the smallest positive integer such that $f^i(x) = x$. Formally we want to prove that if $f$ is OWF then $\forall p(.)$ and sufficiently large $n$, $Exp(cyc_f(U_n))>p(n)$ where $n$ is length of input.

I understand that by applying Markov's inequality we get that, if $Exp(cyc_f(U_n))>p(n)$ then for every polynomial $q(.)$, we have $Pr(cyc_f(U_n)) > q(n).p(n)] < 1/q(n)$.

Score: 3
Gavriel avatar
Basic, easily implementable (and small code size) algorithm for validating signature/token
cn flag

I'm looking for some basic algorithm to:

  • generate a code
  • send it to a website,
  • where after payment a token is generated from the code and sent back,
  • where the token is validated.

I'm not sure how to ask in cryptography terms, so I'll explain what am I looking for:

I have an app that runs on a watch. I'd like to display a short code (number or textual string) on the watch, then use this code in a websit ...

Score: 4
Ali Haktan German avatar
NTRUEncrypt proof that there are plenty of keys
tg flag

In NTRU algorithm one is supposed generate a vector which is invertible as a polynomial in both $(\mathbb{Z}/p\mathbb{Z})[x]/(x^n-1)$ and $(\mathbb{Z}/q\mathbb{Z})[x]/(x^n-1)$. But is there a mathematical lower bound to the probability of f being appropriate in that regard?

Score: 1
tonythestark avatar
Honest verifier zero knowledge property for this protocol
vi flag

This is zero-knowledge proof that show x is not a quadratic residue.

enter image description here

I am trying to verify Honest verifier zero knowledge property.
My steps were these:
Let S be a simulator that does not know how to actually comute NQR(m, .)

  1. Bob will choose a random $s$ and will send a $y$ according to the value of the coin b.
  2. Now simulator does not actually know how to compute b' =NQR(m, y) - and I do not think that  ...
Score: 2
UnpluggedTrio avatar
Elliptic Curve - Is it possible to know whether a particular value is the result of ECadd or ECdouble?
ug flag

As we know the public key is generated from the private key and the process is point addition and point double and so on. If we see a list, it would look like a list of values coming from ECadd and ECdouble.

My question is,

  • Is it possible to know whether this value is a result of ECadd or ECdouble? (by just looking at the value or in connection with any other parameter in secp256k1 like gx or gy etc) wi ...
Score: 1
frt132 avatar
How effective is increasing elliptic curve modulo sizes for quantum resistance?
es flag

From info provided by Google:

  1. Lattice based key pair and signature sizes are roughly 12/2 kb and 9 kb, which is much larger than 256-bit ECC key sizes.
  2. The number of q-bits need to break n-bit ECC can be 6n, but it's also affected by some other factors.
  3. The difficulty level for adding more q-bits to a computer increase exponentially.

Since there could be a long time until humanity builds the 2000+  ...

Score: 1
n-l-i avatar
Does a salted password hash reveal info about the password?
cx flag

Assume a password is hashed with a secure salt, e.g. hash = sha256(password+salt). If the hash and the salt are made public, an attacker can perform an attack by running possible password candidates through the hash function to try and find the correct password eventually. The assumption here is that if the hash function yields the correct output then it was the correct input, and this is often true  ...

Score: 0
amlwwalker avatar
Sharing encryption key via intermediary without the intermediary having access to the content
np flag

Please bear with me... I want to store some data in an untrusted location (a server). I will want to share this with other people. I encrypt the data with AES encryption and a 20 character password. Then, if I know the RSA public key of the people I want to share the data with, I encrypt the password with their public key and upload those to the server also for them to retrieve and access the data at a  ...

Score: 11
Lee Seungwoo avatar
What does 'a reduction is tight' mean rigorously?
ke flag

As far as I know, when someone says 'a reduction is tight', it means that given that there is an adversary $A$ with advantage $\epsilon$ and running time $t$ and another adversary $B$ utilizing $A$ to solve a problem $P$, the advantage and running time of $B$ are apporximated to those of $A$.

But here is my question:

When do we say $\epsilon ' \approx \epsilon$ and $t' \approx t$ exactly? Is there ...

Score: 2
gormatron3000 avatar
Hardness of DL in group of Quadratic Residues (product of safe primes)
fi flag

A protocol I am working with requires $\ell_n$-bit RSA modulus and $\ell_\Lambda$ such that computing $\ell_\Lambda$-bit discrete logs is hard in $QR_n$ (technically $n$ is $\ell_n+2$ bits in the definition of the paper).

Note we have the additional structure that $n$ is a product of two safe-primes $p=2p'+1$ and $q=2q'+1$ so $\operatorname{Ord}(\mathrm{QR}_n)=\frac{\phi(n)}{4}=\frac{(p-1)(q-1)}{4}=p ...

Score: 1
Hern avatar
What is the recommended signature message padding for Ed448 in Bouncy Castle?
is flag

Bouncy Castle provides 6 different paddings for padding messages.

However, I am not quite sure which one to choose from.

ISO10126d2, ISO7816d4, PKCS7, TBC, X923, ZeroByte.

Given that the native Bouncy Castle API requires the message to be greater than 114 bytes.

  • What could be the recommended padding to be used to pad the message?

  • What is the strength and weaknesses of each padding?

  • I would want  ...

Score: 1
Jeff avatar
Signing with symmetric crypto and an arbitrator, question from Applied Cryptography book
jo flag

I've got the 2nd edition, 3rd printing. On page 35 it lists the steps for signing a document:

  1. Alice encrypts her message to Bob with KA and sends it to Trent
  2. Trent decrypts the message with KA
  3. Trent takes the decrypted message and a statement that he has received this message from Alice, and encrypts the whole bundle with KB
  4. Trent sends the encrypted bundle to Bob
  5. Bob decrypts the bundle with K
Score: 2
nitchan avatar
What advantages does FrodoKEM have over other PQCs?
gr flag

What are the advantages of FrodoKEM over other NIST PQC candidates? Also, have any critical vulnerabilities been discovered so far?

Score: 4
Amit avatar
Does Quantum Key Distribution (aka: QKD) qualify as "Cryptography"?
ci flag

This may be a polemic question, but since I did read the rules of the site and "terms and definitions" appear to be legitimate subjects, I want to raise this because I find this interesting, and I want to find out if someone can give me a new perspective on the matter.

Historically, Cryptography was not concerned with the communication channel. The whole point of most Cryptographic devices, protoc ...

Score: 1
Michael Cooper avatar
Is it possible to use AES to produce a private ECC key?
in flag

I am working with hardware that can store an AES key securely--the hardware can perform AES encryption/decryption using a stored key without revealing the key to the caller. However, I would like to use ECC in my application.

For a single ECC key, I think I can do this by encrypting the ECC key using AES, then storing the encrypted key and nonce in the open, and the AES key securely. Then, at run ...

Score: 0
coder avatar
Double Encryption Problem from Boneh/Shoup Textbook
ph flag

I am working on the following problem from the Boneh/Shoup textbook: 5.1 (Double encryption). Let E = (E,D) be a cipher. Consider the cipher E2 = (E2, D2), where E2(k,m) = E(k, E(k,m)). One would expect that if encrypting a message once with E is secure then encrypting it twice as in E2 should be no less secure. However, that is not always true.

(a) Show that there is a semantically secure cipher ...

Score: 2
Generic avatar
A random access machine with lots of random data on its tape is a stronger assumption than the existence of OWFs
lu flag

Suppose we have a random access machine with $(n+1)2^n$ random bits on its tape. This assumption is weaker than assuming the existence of a random oracle, but using this assumption we can construct a PRG and hence a OWF: take a random seed $s \in \{0, 1\}^n$, and output $n+1$ bits, where the $i$th bit outputted ($i=1,...,n+1$) is the $(i-1)2^n + 2^s$th position on the tape. This is trivially a P ...

Score: 1
How to find square root of a point on elliptic curve over finite field?
US flag

Using spec256k1 curve, Is it possible to calculate square root of a point? And If so what point would I get if the result is not a whole number? For example Let G be generator point. square root of 81G should be the point 9G but for 80G the result is decimal but I would get a point over finite field. In that case what would be the scalar of the point sqrt(80G)? Also the point I want to take the square r ...

Score: 0
princeofmillerovo avatar
Implementation of XSL attacks on block ciphers using dynamic S-Boxes
tk flag

For those who are not familiar with; XSL attacks basically focus on deriving a set of equations from the internal mechanics of a block cipher and then solving the same equations to recover the secret key.

Also a reason why Camellia is often seen equal to AES in terms of security despite using more rounds.

My question is:

Are block ciphers which utilize dynamic s-boxes such as Twofish immune to XSL att ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.