Latest Crypto related questions

Score: 0
dlfls avatar
RSA question for public exponent is an even number but not 2, and not big
in flag

While Public exponent is an even number which means Can't get the d in normal way since gcd(e, phi) won't be 1, and in this case only used one prime number for N (multiple uses for one prime number) What is the idea of getting the m,could p = 3 mod 4 be helpful? Thank you for any idea.

Score: 0
Tools to debug handshake failure after client key exchange, change cipher spec and encrypted handshake message TLS1.2
pk flag

Hello I have been receiving Description : Handshake failure after sending client encrypted handshake message to the server. Is there any tools I can use instead of wireshark to detect the source of this problem because wireshark did not really help me at this point. wireshark_capture

Score: 2
brethvoice avatar
Hotbits vs. Random.org vs. Anything else?
jp flag

I was searching for a random seed to use with a pseudo-random number generator (not trying to encrypt anything). I went to the following web sites:

https://www.fourmilab.ch/hotbits/secure_generate.html

https://www.random.org/

It appears that Random.org has a solid history and is not experiencing problems with DDoS attacks because they do not require an API key. I obviously would not want to use anything  ...

Score: 1
kpeteL avatar
How to do addition in Montgomery form?
cn flag

I'm trying to do ECDSA signing, and I need to compute

$$\left(k^{-1} \bmod n \cdot (m + d\cdot r) \bmod n\right) \bmod n$$

I'm able to do the inverse function and multiplication in Montgomery form, but how should I add $m$? Does the arithmetic play well if I just converted $m$ to Montgomery form? Alternatively, I could do $m + d\cdot r$ in 512-bit, but things would get quite messy and slow.

Any oth ...

Score: 0
How to use SEAL to encrypt a model file(or data files)?
ru flag

How to use SEAL(Microsoft's HE library) to encrypt a local training model file? Any code demos?

Score: 0
RobbB avatar
Looking for multi-party key exchange/shared secret algorithm with specific requirements
vn flag

I'm looking for the ability to create a SINGLE CONSTANT shared secret amongst two or more users (a group) AND if a new user is added to such a secured group the new user should also be able to learn the already known and shared secret without the existing users needing to resend any new data or changing the common secret. The new user should only require ONE received piece of data such as with standard  ...

Score: 0
JamesTheAwesomeDude avatar
How is ECB secure?
cn flag

Setting aside legitimate concerns such as lack of CPA security (not to speak of malleability issues) and thus near-universal insuitability of AES-ECB for general purposes, I thought I recalled reading that there is some form of security which ECB has: specifically, when the plaintext comprises entirely uniformly random data, that it gains some form of security. However, I could not easily find thi ...

Score: 0
Security definition for IND-CPA of public key encryption
us flag

In the security game between the challenger and the adversary for the security definition of public key encryption, the challenger creates and gives the public key pk to the adversary. The adversary chooses two messages of equal length $m_0$ and $m_1$ and asks the challenger to encode these. Finally, the adversary has to guess which message was encoded.

Isn't it always possible for the adversary to do th ...

Score: 1
Why does the RFC version of HKDF-Expand start the counter at 1?
in flag

In RFC 5869, the definition of HKDF-Expand is given as follows, with the terminating counter value ranging from 1 to (presumably) 255:

The output OKM is calculated as follows:

   N = ceil(L/HashLen)
   T = T(1) | T(2) | T(3) | ... | T(N)
   OKM = first L octets of T

   where:
   T(0) = empty string (zero length)
   T(1) = HMAC-Hash(PRK, T(0) | info | 0x01)
   T(2) = HMAC-Hash(PRK, T(1) | info | 0x02 ...
Score: 1
just_learning avatar
big-O (time complexity) for AES (CBC - mode)
re flag

I have been searching for many days about the time complexity of O(n) for AES (preferably CBC mode). Moreover, I am searching for formal documents like papers/books/standards. I found this paper: https://ieeexplore.ieee.org/document/5945606 that says O(1)... I can't believe that! And this: https://link.springer.com/chapter/10.1007/978-3-319-15943-0_10 that describes attacks complexity on AES... Has anyo ...

Score: 5
vojta avatar
Status of whitebox cryptography in 2022
id flag

There has been a lot of discussion about whitebox cryptography in recent years. However, I haven't found any signs of real world applications using it.

  • Are there any real world IT solutions depending on whitebox cryptography as of 2022?
  • Is any kind of whitebox cryptography considered secure by any authority (NIST etc.) and openly used in some really critical areas (banking, military, ...)?

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.