Latest Crypto related questions

Score: 1
Input size recomendation of sequence for each test in NIST SP 800-22
de flag

I am using the NIST SP 800-22 to evaluate the performance of the Random Numer Generator.

NIST SP 800-22 has a total of 15 tests. In each test, it has a recommendation for the size of the tested sequence. For example, in the Discrete Fourier Transform (Spectral) Test : "It is recommended that each sequence to be tested consist of a minimum of 1000 bits (i.e., n ≥ 1000)." So it means, the size o ...

Score: 0
Jim avatar
AES-GCM Encryption of 1 byte
cn flag
Jim

AES is known to be resistant against the plain text attack.

However, any idea what is the possibilities of breaking it if the input data is just the one byte, with known and unknown IV?

Score: 0
Felix avatar
Is there a way to modify an existing RSA key pair so that the functionality remains?
br flag

I have an existing RSA key pair, how to 'derive' a different key pair based on the existing one so that the encryption decryption functionality remains but the original key isn't interchangeable with the 'modified'/'derived' key?

Score: 1
Partizanki avatar
On the effectiveness of Sidelnikov-Shestakov attack under a bad guess
ag flag

I have been studying Wieschebrink paper "Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Codes". In the paper a cryptosystem using GRS codes is exhibited with an attack proposed to the cryptosystem, this one being the Sidelnikov-Shestakov attack (well, actually a reformulation from the original one that at least to me is easier to understand).

In the attack you try to recover the ...

Score: 0
Shweta Aggrawal avatar
Using PRF as a building block to build other primitives?
us flag

I am doing an independent research in cryptography. I have designed a post-quantum secure pseudo random function.

Just constructing a PRF will not help me to publish in reputed journals. I was thinking to use the PRF I designed as a building block to build some other primitive?

Can someone suggest me something? In which direction I can proceed. What are some primitives which can be solely designed u ...

Score: 0
Forming a 64 bit CRC from a 32 bit CRC
us flag

Suppose I have a 32 bit CRC function $\text{crc32}(x)$ that satisfies all the properties of a CRC. Suppose also that I am a lazy developer who wants to create a 64 bit CRC function but doesn't want to actually have to implement another CRC, so I design a function

$$ f(x)= \text{crc32}( {\tt{"}\tt{foo}\tt{"}}\ ||\ x ) \cdot 2^{32} + \text{crc32}( {\tt{"}\tt{bar}\tt{"}}\ ||\ x ) $$ Does $f$ form a CR ...

Score: 1
Ali_Habeeb avatar
Separate Messages Encryption
re flag

In a public key system, Alice sends Bob separate messages telling him information about the time T and place P they would meet, encrypted with Bob's public key. What is the most secured protocol:

A --> B : {T},{P}

or

A --> B : {T,P}

?

In other words, which one is most secure: sending separate messages with different encryptions, or combinig two messages in one and sending it with one encryption?  ...

Score: 0
bip32 hardening derivation leak?
kz flag

I don't get it. I find all the available documentation around bip32 hardening derivation complete confusing. Could anyone explain me if this algorithm has any issues:

mnemonic = bip39.generate mnemonic
seed = menominic.seed
masterKey := bip32.newMasterKey(seed)
child1 = masterKey.newChildKey(0)
child2 = masterKey.newChildKey(1)

Alice receive child1.privatekey

Bob receive child2.privatekey

Is there ...

Score: 3
killertoge avatar
Whats the reason for using elliptic curves of order |E| = fr
lk flag

To be more precise, in the books I sometimes see that they just require you that the order of your elliptic curve is $|E| = fr$, where $f$ is some small integer with possible factors, but $r$ is a large prime. I know that this is ok when working with ECC since, for example, the ECDLP is as hard as the largest prime order subgroup. But why the urge to work with this? Is it in practice easier to generate su ...

Score: 2
Miliano avatar
Generating and validating a signature with ED25519 expanded private key
jp flag

I am building a encrypted messaging app over tor network and currently I'm struggling on using tor generated ed25519 private key to sign and verify any message.

Below piece of code works with a 32 bytes key however after skipping 32 header bytes of hs_ed25519_secret_key it fails to verify the signature on below cases:

1 - secret: left half of the remaining 64 bytes, public: right half
2 - secret: ...

Score: 0
1st Preimage, 2nd Preimage, Collision resistance of powers of 2 mod n
bg flag

Let $n$ be a product of two odd, distinct large primes $p$ and $q$. Define the hash function as $$ H_{F}(x)=2^{x} \bmod n $$

Is this hash function resistant to 1st/2nd preimage and collision attacks? Why/why not? Could you provide examples?

Also, given $o_\mathrm{max}$ is the maximum order of an element modulo $n$, why can we say that $o_\mathrm{max}=\operatorname{lcm}(p-1,q-1)$?

Score: 0
David avatar
Algorithm that solves a system of linear equations over finite fields when a parameter is needed
bl flag

I was reading Kipnis' and Shamir's paper on Cryptanalysis of the HFE Public Key Cryptosystem by Relinearisation and I wanted to implement the example at the end in Octave without using any additional packages (e.g symbolic ...). I would like to create an algorithm that solves systems of linear equations over finite fields (q = 7 in this case) where you have more variables than equations (in this cas ...

Score: 1
theflamingtiger avatar
Would this hash based encryption algorithm work in theory?
bf flag

I was just thinking about this and couldn't seem to find anything on it online.

So the idea I had was this:

Generating a random key of some length. Then hashing this key with SHA256 (or something of similar security), then looping through each byte of the hash and each byte of the text and doing an XOR operation with both of these bytes, generating a new byte. Then stringing these new bytes together ...

Score: 1
xhuliano avatar
Why does differential cryptanalysis always start from the last round?
cn flag

Suppose we are working with a cipher with the same general structure as AES.

I want to attack the cipher in the following way: suppose that the differential holds only for the first round (much higher probability than wanting it to hold for all rounds from the first to the penultimate), recover the first subkey, then proceed from there, always crafting plaintext such that the differential is like ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.