Latest Crypto related questions

Score: 0
Asimonu avatar
Difference signature / asymetric encryption (PQC)
cn flag

The NIST is currently trying to select new standards for post-quantum cryptography. The two main categories for the candidates are "Public-key Encryption and Key-establishment Algorithms" and "Digital Signature Algorithms".

The signature algorithms are based on public-key encryption algorithms. Thus, why to separate these two categories ? Is it a matter of implementation, or of performance maybe  ...

Score: 0
Muhammad Awais avatar
How round constants are chosen in a block cipher?
cn flag

Block ciphers that are NOT LIGHTWEIGHT use relatively complex key scheduling algorithms to enhance their security and thwart some of the known cryptographic attacks. In such ciphers round constants are also added for removing symmetries in the structure (if these exist) but the selection criteria for the round constants is never mentioned.

How should these constants be selected for any block cipher? ...

Score: 0
Finlay Weber avatar
What other algorithm/scheme exisits for asymmetric encryption other than RSA?
ng flag

RSA seems to be the only scheme I see whenever I look into asymmetric encryption. I am now curious to know if other algorithm/scheme exists for asymmetric encryption other than RSA?

If so , what are these other schemes?

Also any explanation for the popularity of RSA?

Score: 1
Is there any known/standard encoding or cipher method that uses a 64-character alphabet from byte 30 (ASCII `0`) to byte 6F (ASCII `o`)?
cn flag

Is there any known/standard encoding or cipher method that uses a 64-character alphabet from byte 30 (ASCII 0) to byte 6F (ASCII o)?

I'm trying to reverse-engineer a file format, and I have good idea of what some of the contents of the files should contain, but I'm not seeing any obvious patterns in the data that correspond to my expectations. The biggest peculiarity that I've been able to identify i ...

Score: 0
Apache Server 2.4.53 with Custom Built OpenSSL
in flag

I am trying to launch an Apache server on Ubuntu 20.04 running a custom built OpenSSL, but I don't want to install it on my machine, instead, I want to show the server where it can find all libraries and configuration files relevant to OpenSSL. As you guess, this is an experimental study, so I don't want to mess with my default OpenSSL.

I used the following command to configure my server:

./configure -- ...

Score: 1
dlfls avatar
In RSA, What does gcd(e,phi) != 1 means? Why always choose e = 2^n +1 not 2^n?
in flag

Recently I have few experiences with Questions in RSA which e is 2^n instead of 2^n+1, and that leads to gcd(e, phi) is not equal to 1... Won't this make the private key impossible to get? Is the Rabin cryptosystem the only way out?

Score: 1
Konstantina Mil avatar
How to calculate entropy of a specific cryptosystem?
sa flag

I want to calculate the entropy of a specific cryptosystem such as the Caesar cipher or Vernam cryptosystem etc but I don't quite understand how to do so. Any help?

Score: 2
Rein Ernst avatar
Is it possible to calculate the modular inverse of a secp256k1 public key?
jp flag

I know that it wouldn't be possible to use the extended Euclidean algorithm, since it would require the ability to divide a public key and calculate the remainder. I was wondering if there were any other ways of calculating the modular multiplicative inverse of a point on an elliptic curve (like secp256k1)? Or perhaps a reason why it is provably impossible? Is there a way (other than brute force) to fin ...

Score: 0
Dylk58 avatar
Short description of encryption methods?
jp flag

I can't seem to wrap my head around these encryption methods. I can't find a brief description for any of them.

  • Hash then encrypt
  • MAC then encrypt
  • Encrypt and MAC
  • Encrypt then MAC
Score: 0
Signing a hash of file vs signing a file
uz flag

If person A generated a hash (e.g sha256) of a file and then signed the hash using a private key.

Given person B only has the public key, file, signature and the hash, would verifying the signature using the public key be sufficient to prove person A signed the actual file?

What hashes and algorithms are best suited to this?

Score: 0
Facundo Fleitas avatar
How to reduce Diffie Hellman problem to ElGamal?
ru flag

enter image description here

I'm trying to answer without success questions (ii - iv)

Any hint will be appreciated :)

Score: 0
JamesTheAwesomeDude avatar
Detecting MD5sum collision vulnerability?
cn flag

It's my understanding that MD5 is still resistant to preimage attacks in the general case, but that an attacker may still launch a second preimage attack if an innocent file is "unlucky" enough to be a viable collision candidate.

  • What are the odds of a uniformly random file of length $512n$ bits being a candidate for an MD5 collision attack?
  • Is it possible to detect current state-of-the-art attack ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.