Latest Crypto related questions

Score: 1
Willi avatar
Non-committing authenticated encryption schemes vs committing authenticated encryption schemes
fr flag

I'm told that TLS 1.3 supports only non-committing authenticated encryption schemes. What is a non-committing authenticated encryption scheme? What is the difference between committing and non-committing authenticated encryption schemes? What are the pros and cons?

Score: 1
Dylan avatar
"shared" variant of 1-out-of-N oblivious transfer
bb flag

In the traditional 1-out-of-n OT, we suppose Alice has an array $A=\{x_1,{\cdots},x_n\}$ and Bob has $idx=i\in\{1,{\cdots},n\}$. After running the OT, Bob leans $x_i$ and nothing else, Alice learns nothing about $i$.

So, my question: is there a "shared" variant of 1-out-of-N oblivious transfer?

We consider the array and the queried index are secret-shared between Alice and Bob (e.g., additive secret shar ...

Score: 0
muhammad haris avatar
Why use cyclotomic polynomials for RLWE?
es flag

This paper On Ideal Lattices and Learning with Errors Over Rings proposed RLWE which is Ring and hence efficient version of LWE problem. My question is that they considered cyclotomic polynomials for modulus. I am not sure why cyclotomic polynomials are used and what extra advantage we get by using them?

Score: 0
mini minions avatar
How to caculate the inverse of function $x^3$ in $\mathbb{F}_{2^n}$
mx flag

How to caculate the inverse of function $x^3$ in $\mathbb{F}_{2^n}$?, Any monomial $x^d$ is a permutation in the field $\mathbb{F}_{2^n}$ iff $gdc(d,2^{n}-1)=1$,why?

Score: 1
pioneer avatar
About two sequence conversion methods in NIST 800-90B
in flag

I am reading the 800-90B document. In particular, I'm looking at Chapter 5, the chapter on checking that samples conform to IID. There are 11 tests such as Excursion Test Statistic and Number of Directional Runs. All these tests can be performed on binary data as well as non-binary data.

In the case of some tests, in the case of binary data, the test is performed through conversion in one of two  ...

Score: 0
mini minions avatar
How to calculate the inversion fuction S:S:\mathbb{F}_{2^n}\rightarrow \mathbb{F}_{2^n},with S(x)=x^{-1}
mx flag

The S-box is defined as the generalised inverse function $S:\mathbb{F}_{2^n}\rightarrow \mathbb{F}_{2^n}$,in quotient ring $\mathcal{R}:=\mathbb{F}_{2^n}[X]/(X^{2^n}-X)$ with $S(x)=x^{-1}$, is correct $S(X):=X^{2^n-2}$. But the Euler's theorem says $x^{\varphi(n)}\equiv1\pmod{n}$,so the answer is $x^{\varphi(n)-1}=x^{2^{n-1}-1}\equiv x^{-1}\pmod{n}$,why is $S(X):=X^{2^n-2}$

Score: 2
Is there a discrete log challenge?
in flag

RSA challenge is well-known and it has a wiki page https://en.wikipedia.org/wiki/RSA_Factoring_Challenge.

Is there a discrete log for $\mathbb F_p$ where $p$ is Sophie-Germain prime?

Score: 3
Tom avatar
Skipping first outputs of the stream cipher
tf flag
Tom

I remember reading somewhere that sometimes in some stream ciphers it is necessary to skip the first values they produce. I can't find any information on this right now.

But it seems to make sense. Just as a hash function needs to do many rounds before it returns a random result, the CSPRNG needs some number of iterations so that seed and key information cannot be obtained from the first results. ...

Score: 0
Bilinear map and homomorphic inner product
in flag

This is a question related to homomorphic inner product as discussed here: Inner product with homomorphic encryption

I browsed through the recommended papers and I have just a major Stumbling block in my understanding.

Why can't a simple bilinear map of two points and the resulting target group suffice to implement an encrypted form of the inner product from two encrypted inputs?

Score: 0
Anon avatar
How is there a $\frac{1}{poly(n)}$ bias in a multiple-round coin tossing protocol with commitment?
cn flag

On p.2, Example 1.1 (in this paper), there is a description of a coin tossing protocol with bias 1/4. In the paragraph below the example, they note that for a protocol with $r$ rounds (assume for the sake of clarity it is $poly(n)$) there's a bias of $\frac{1}{r}=\frac{1}{poly(n)}$.

I am quite new to Cryptography, and since the paper they cite in this context is quite old and very different to their examp ...

Score: 1
Elliptic Curve - distinguish between two points after multiplication
cn flag

If $P$ and $Q$ are two points on an elliptic curve of large prime order, given $P, Q$, and a point $R$ which is either (a) $nP$ or (b) $nQ$, is it possible to determine if $R$ is of form (a) or form (b)? Here $n$ is a secret.

Score: 1
Is possible to cipher a 64bit message into a 64bit message using public key cryptography?
us flag

I'm looking for a non-invertible bijective function mapping a 64bit value into another 64bit value.

I can't use a hash because it isn't bijective.

Could this be done with public key cryptography ? The key and function may be big. It's just the data that would be small. I would destroy the private key as I never need to decipher.

Since the application is distributed, using a public key or equivalent wou ...

Score: 0
mike avatar
Secuirty definion of a ad hoc multi-input functional encryption scheme
in flag

I have to write an essay on the paper ad hoc multi-input functional encryption, and can't understand the security definition. In a nutshell it is a primitive that allow sources to supply encrypted data, such that at any point a dynamically-chosen subset of sources can allow an agreed-upon joint function of their data to be computed by the aggregator.


Syntax description:

aMIFE syntax


Security definition:

enter image description here


I ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.