Latest Crypto related questions

Score: 1
Yara avatar
Can I decrypt AES-CBC ciphertext if I have the key without IV?
bt flag

Can I decrypt ciphertext from AES-CBC encryption, if I have the key and ciphertext only?

Score: 0
Password Authenticated Key Exchange Protocol
ru flag

This problem appeared in a past exam paper.

In PAKE (password authenticated key exchange) protocols, $A$ and $B$ authenticate each other by knowledge of a shared password that is too weak to allow an attacker to try out repeated guesses to try to find it by knowing how a single message of the protocol was constructed. There is no cryptographic signature or alternative shared secret or trusted third party ...

Score: 3
Devising a Feistel cipher in which the subkeys are constructed badly so that a meet in the middle attack will compromise its security
ru flag

I'm trying to find a Feistel cipher in which the subkeys are constructed badly so that a meet in the middle attack will compromise its security. I thought about trying out a cipher where all the subkeys are equal but that didn't really lead to anything. I know that in general you want ciphers to not be linear in their subkeys so I'm trying to exploit that property, but haven't made much progress.

 ...
Score: 1
Order of point on elliptic curve vs order of base field
hr flag

I'm looking at the FIPS-186 standard. On page 88, it gives a table recommending the size of the base field for the elliptic curve versus the order $n$ of a point on the curve. The numbers don't seem to make sense. For example it says if the bit length of $n$ is between $161$ and $223$, then the bit length of the ambient finite field should be $192$. But if you go off these numbers, there's a good c ...

Score: 1
What's the probability of cracking this cipher using partial information about the private key obtained from $k$ public keys?
br flag

For the following cipher, what is the probability of someone without the private key generating a valid public key, using only information from a list of $k$ public keys previously generated with the private key?

This is the cipher:

To generate the private encryption key, $Y$: Let $X$ be an $n$ by $i$ matrix of random integers between $0$ and $9$, inclusive. Let $Y$ be a vector of the $n$ real nu ...

Score: 4
Daniel S avatar
What is the effect of low rank dual sublattices on the dual lattice attack on LWE?
ru flag

In the dual lattice attack of Espitau, Joux and Kharchenko (On a dual/hybrid approach to small secret LWE), the authors propose distinguishing (and subsequently recovering secret values) of LWE samples $(A,\mathbf b)=(A,A\mathbf s+\mathbf e)$ by finding dual vectors $(\mathbf x^T|\mathbf y^T)$ such that components of the vectors are small (with the possible exception of a small subset of components ...

Score: 0
Morbius avatar
Computational indistinguishability of two LWE type samples
cn flag

Consider the problem of distinguishing between polynomially many samples of either \begin{equation} (x, b, As + e) ~~\text{or}~~\left(x, b, ~Ax + b\cdot(As + e) + e'\right). \end{equation}

Here, $A$ is a public matrix and $s$ is a secret vector chosen uniformly at random. $e$ and $e'$ are Gaussian errors. $x$ and $b$ are sampled uniformly at random.

The dimensions of different objects are:

\begin{ali ...

Score: 1
Dominic van der Zypen avatar
Minimum cycle length for Rule 30 automaton with bit-toggle
br flag

A rule 30 cellular automaton produces chaotic output from a very simple rule and therefore can be used as a pseudo-random generator (but not a cryptographically secure one).

One of the problems is that there are "black holes", for instance the constant 0 bit-vector gets mapped to itself, and the constant 1 vector gets mapped to constant 0.

This can be mended using a simple toggle (via XOR) of bit 0 ...

Score: 1
phantomcraft avatar
Does inserting an entry of 32/64-bits into a Feistel S-box would consume the same cycles per byte as inserting a single byte?
pf flag

Blowfish splits a 32-bit word into 4 bytes and insert each byte as an entry in a S-box.

Let's suppose I do the same but with an entire word, 32 or 64-bits. MARS block cipher does the same with 32-bit words.

Does it consume the same cycles per byte as inserting a single byte?

Score: 0
Mir Henglin avatar
When can composition be viewed as a vector-valued query with differential privacy?
cn flag

Page 33 of The Algorithmic Foundations of Differential Privacy gives two examples where a composition of mechanisms can be viewed as a vector-values output, histograms, and fixed counting queries, where the privacy bound can be analyzed by considering the sensitivity of the vector-valued output.

I was wondering about a more general statement; when, generally, can a composition can be viewed as a vecto ...

Score: 1
Jonathan Lee avatar
"Reverse" Reed-Solomon error correction, given prefix of input
ua flag

I have a string $S$ of length (say) 34, that I know the first (say) 24 bytes of, but not the last 10. I also have the 10-byte error correcting code $RS_{44,34}(S)$ in full. Do I have any hope of recovering $S$?

The amount of information of $S$ that I'm missing far exceeds the theoretical guarantee of Reed-Solomon (which I think in this case is 3 bytes), but at the same time, there's $2^{80}$ poss ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.