Latest Crypto related questions

Score: 1
Proving that a protocol is not attackable
ru flag

Consider the following protocol:

  1. $A\rightarrow B: \{N_A,A\}_{pk(B)}$

  2. $B\rightarrow A: \{N_B,N_A\}_{pk(A)}$

  3. $A\rightarrow B: hash(N_B, A, B)$

where it is intended that when either $A$ or $B$ has completed their own role in the protocol, they are assured that the other has participated in the protocol with them and that $N_A$ and $N_B$ are random nonces generated by $A$ and $B$. $\{X\}_{Y}$ mean ...

Score: 1
charles avatar
What is the Work Factor of the one time pad?
fr flag

Work Factor is defined as the minimum amount of work (can be the length of the key) to determine the secret key of an cryptosystem (HAC, Menezes, Alfred J. et al).

And One time pad have unconditional security or is perfectly secure, it means it is impossible to break even with unlimited processing power and memory (when correctly implemented, of course). How these definitions can be met? Because it ...

Score: -1
hmngwn avatar
.pem file from a SHA256 hash
cn flag

Is it possible to generate a .pem file from a sha256 ?

As an example, I obtained the hash of a sha256 certificate, I don't have more information on it. Can I generate a certificate based on this hash in order to listen to the traffic using this certificate?

Score: 0
Anon avatar
If we can solve discrete log with on $\frac{1}{poly(n)}$ instances, then we can solve, with high probability, for all instances
cn flag

I am trying to prove the following:

Given an ensemble $\{p_n, g_n\}$ ($p_n$ is an $n$-bit prime and $g_n \in \mathbb{Z}^*_{p_n}$ is a generator), if $A$ is a deterministic polynomial time algorithm such that:

$$ \Pr_{x \leftarrow \mathbb{Z}^*_{p_n}} [A(a)=x \text{ where } g_n^x=a]=\frac{1}{poly(n)}$$

then there is a PPT algorithm $A'$ that solves discrete log with high probability for this ensem ...

Score: 2
Why does the von Neumann corrector only work when the input bits are independent of each other and same bias?
de flag

I read some papers that mention the von Neumann corrector. They always assume that for the von Neumann corrector, the input bits are independent of each other and same bias

Why does the von Neumann corrector only work when the input bits are independent of each other and same bias?

Score: 2
DannyNiu avatar
Is this half-smart way of verifying EdDSA signature secure?
vu flag

In the final step of verifying an EdDSA signature, 4[S]B is compared to [4]R + [4][k]A.

Because I'm using the XYTZ - extended twisted Edwards coordinates, I want to, for efficiency reasons, do:

$$ Y(\text{Left}) \cdot Z(\text{Right}) = Y(\text{Right}) \cdot Z(\text{Left})$$,

But that leaves the X coordinates unchecked.

Can this check be secure?

Score: 0
In OPPRF-based PSI, is there an opprf protocol against malicious receiver
ma flag

I want to modify the semi-honest opprf protocol in CCS17(Practical multi-party private set intersection from symmetric-key techniques) to be against the malicious receiver. I see that Paxos against malicious sender and receiver, but for some reason, I need to use OPPRF, is there an easy way to modify the semi-honest opprf in CCS17?

Score: -1
How to Remove Encryption Key from Python Code
us flag

I am trying to remove the encryption (AES) from the improved LSB which is in Python:

I want to do comparison on LSB with AES and LSB without AES. The AES is connected to LSB.py, PLShandler.py, main.py. How to detach/remove the AES completely. i try deleting the AES.py but show error as other files are connected. How to remove the connection in each file. I don't know to reverse engineer that.

https://gi ...

Score: 1
ming alex avatar
A security issue of a Bit commitment scheme constructed by Naor in 1990
in flag

In the Section 3.12 of book writen by Boneh and Shoup, a Bit commitment from secure PRGs is presented as follow:

Bob commits to bit $b_0\in_R\{0,1\}$:

Step 1: Alice chooses a random $r\in R$ and sends $r$ to Bob.

Step 2: Bob chooses a random $s\in S$ and computes $c=com(s,r,b_0)$, where $com(s,r,b_0)$ is the ollowing function: $c=com(s,r,b_0):=\left\{ \begin{array}{rcl}G(s) & \mbox{if}& b_0=0 \\ G ...

Score: 0
How to securely implement a deadpool in a PoW blockchain?
tr flag

Imagine you have a blockchain where the Proof of Work scheme is integer factorization. There is an opcode that takes two integers $N,M$ where it returns true if $M\not\in \{0,1,N\}$ and $N \mod M \equiv 0$. Now, suppose we want a number factored, say $M_g$. It could be a Cunningham number, a brilliant number or any other number where there is an interest in knowing its factorization.

We can create a tr ...

Score: 0
Deducing a secret key from two different public keys
ru flag

Show that if two different RSA public keys $p_k$s are known to an attacker for the same secret key $s_k$, then $s_k$ can be broken

I've deduced that that if the 2 public key exponents are $e_1,e_2$ then they have the same remainder modulo $\phi$, but that still doesn't help me determine $d$.

Score: 2
Is it possible to adapt Keccak to use 60-bit native words, without having to emulate U64?
ca flag

Assume an architecture with fast 60-bit native words (a close example would be Ocaml, which has unboxed 63-bit numbers, and only boxed 64-bit numbers). We're looking for the fastest hash function in that architecture. Keccak is great, but our best bet, so far, is to port it from implementations that use 32-bit numbers, such as JavaScript. That would be sub-optimal. I wonder if it is possible to modify K ...

Score: 0
Mick8695 avatar
IIS Crypto 3.2 not getting rid of Diffie Hellman algorithms of less than 2048 bits ... or am I missing something?
us flag

I'm trying to stop a server using Diffie Hellman algorithms of less than 2048 bits ..but I'm getting confusing results

I've run

Get-TlsCipherSuite | Format-Table Name, Exchange, Cipher, Hash, Certificate

and I can see

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA

TLS_DHE_RSA_WITH_AES_128_CBC_SHA

......all of which I know to use only 1024 bit ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.