Latest Crypto related questions

Score: 2
phantomcraft avatar
Authenticated Diffie-Hellman with no proofs that each one keys are the right keys. Is it possible?
pf flag

Let's suppose that Bob has only Alice's IP and no more information about Alice's key, nor the digest of Alice's key.

They exchange keys and need proof that the received keys are the same keys that were sent.

How Bob and Alice can know that the key received is the right key?

Also, I read about Sigma protocol:

The general idea is that Alice and Bob do an unauthenticated Diffie-Hellman (D-H) key exc ...

Score: 0
eja avatar
Is there a cryptography algorithm for signing values with two keys and requiring both to verify it?
de flag
eja

Is there an algorithm that lets me sign a value with two keys at the same time, and in turn requires both keys to verify the signature?

For instance, a scheme could work like this:

  • Sign X with Key1 and Key2 at the same time
  • Verify X is signed by these two keys

This would be like a joint bank account: to do anything on this account, the bank will require signatures from the two persons that initially  ...

Score: 0
Shweta Aggrawal avatar
A doubt in pairing based cryptography
us flag
  1. I have seen authors taking $G_1=G_2=G_T=G$ to be the same group of prime order $q$.

  2. What I know is that for pairing of type $$e:G_1\times G_2\rightarrow G_T,$$ size of the element in the target group is $kn$ where $n$ is the size of an element in $G_1$ and $k$ is the embedding degree.

Source: A New Family of Pairing-Friendly elliptic curves by Michael Scott and Aurore Guillevic. and this que ...

Score: 2
Turbo avatar
Historical key sizes for RSA and discrete log
ru flag

What is the historical pattern for key size increases for rsa vs discrete log?

What are the current and future projected sizes for these?

Score: 2
How do I find an equivalent permutation of AES S-box which sends $0$ in $0$?
de flag

I am testing the quality of AES S-box and using the lookup table I built a function from GF($2^8$) to GF($2^8$) seen as vector spaces. I was wondering if there is a transformation that I can use to find an equivalent permutation of AES S-box that sends $0$ in $0$ without modifying the properties of the S-box such as linearity, differential uniformity and so on.

Score: 1
SquareRootOfTwentyThree avatar
Test vectors (points) for Ed25519
vn flag

I am trying to verify an Ed25519 implementation, but I can't find any test vectors for the curve points. All test vectors focus directly on signature constructions (EdDSA).

I tried to use https://asecuritysite.com/ecc/nacl07 but that seems to give the wrong results. For instance, it reports that the affine coordinates of the point 5G are:

x = 4938425407427312995059319313886117595473939396972359778374 ...

Score: 0
recover private keys (RSA)generated with weak LCG
ru flag

How is it possible to recover RSA private keys considering that weak LCG (random number generator) is used? I have some other keys (Public and private created with the same generator) and also some crypt texts encrypted with both keys.

It is relevant to highlight that there is no clue about the algorithm used to create those keys.

Any ideas?

Thanks.

Score: 1
Dominic van der Zypen avatar
Approximate size of image of SHA512
br flag

Let $s: \{0,1\}^* \to \{0,1\}^{512}$ be the SHA512 hash (where $\{0,1\}^*$ is the countable set of all finite $\{0,1\}$ strings.

Is it known whether $|\text{im}(s)|/2^{512} \geq 0.5$?

If yes, what is the largest $n\in\mathbb{N}$ such that $|\text{im}(s)|/2^{512} \geq 1 - (1/2)^n$?

Score: 2
Bleichenbacher attack equation
ng flag

In the Bleichenbacher attack, when the $|M_i−1| = 1$, we should choose $r_i >= 2(bs_{i-1} -2B)/n$ in order to increase the search performance. I don't quite understand how this $r_i$ value is calculated and how this can improve the performance. Anyone can help? The above information can be found on https://eprint.iacr.org/2012/417.pdf page 3.
And the original paper is http://archiv.infsec.et ...

Score: 1
muhammad haris avatar
Why there is so high computational cost of multiplication in Microsoft Seal?
es flag

I was doing some Microsoft Seal testing on my macbook pro (i7) and got following results

Coefficient mod $q = 100$ bits and Polynomial degree $n= 8192$

  • Ciphertext-Plaintext multiplication takes 0.211 milliseconds
  • Ciphertext-Ciphertext multiplication takes 24 milliseconds, when I pick 5 RNS moduli for coefficient mod.
  • It takes 9 milliseconds when I pick 2 RNS moduli for coefficient mod.

I want to und ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.