Linked Questions

0 votes
1 answer
103 views

I've 8 bytes before encryption (for example: 01 02 03 04 05 06 07 08) and 8 bytes after DES encryption: ...
barwnikk's user avatar
  • 101
13 votes
2 answers
4k views

Consider a block cipher with a key of size 128 bits but a small block size, say 32 bits. Is this kind of block cipher secure? I would like to know to what extent I can use a small block cipher, like ...
Dingo13's user avatar
  • 2,917
9 votes
2 answers
4k views

In NIST's Submission Requirements and Evaluation Criteria for the Lightweight Cryptography Standardization Process document it is stated that: 3.1 AEAD (Authenticated Encryption with Associated Data) ...
kelalaka's user avatar
  • 50k
6 votes
3 answers
2k views

NOTE: QUESTION UPDATED. SEE BOTTOM OF THIS POST. I'm writing something where I need to make someone come across as though they know cryptography. I don't know enough, but as cryptography plays only a ...
Nicola's user avatar
  • 369
4 votes
2 answers
4k views

I have recently read about how blockciphers and how stream ciphers work, and although I think I finally got everything right, I'm still wondering how increasing blocksize increases security.
blacklight's user avatar
2 votes
3 answers
2k views

I am mainly looking for security on 2-key $\operatorname{3DES}$ implementation where $K_1=K_3$. How hard or easy is it to crack $\operatorname{3DES}$ when $K_1=K_3$?
SSA's user avatar
  • 670
1 vote
1 answer
2k views

I'm a little confused over how exactly Linear Feedback Shift Registers (LFSR) work, I kind of get it, but not really, can someone help me understand it? I know it XORs bits in a loop against some mask,...
Anan's user avatar
  • 65
0 votes
3 answers
384 views

With the term GPU programming, I'm referring to highly parallelizable computing in general. Lastly, I have built a bit of a background in cryptography. So I have started to wonder if/where GPU ...
tur11ng's user avatar
  • 1,002
3 votes
1 answer
546 views

As ASICs are specifically designed to generate the hash for a block of a block chain. which is much faster than other GPUs which are used to break 2key-3DES. can we use Array of ASICs to break 2key-...
SSA's user avatar
  • 670
0 votes
1 answer
574 views

I've spent the night reversing the implementation of the 'Basic Text Encryptor' from Jasypt [1]. The algorithm is defined in documentation as 'PBEWithMD5AndDES'. The implementation is this: A random ...
testUser12's user avatar
0 votes
1 answer
305 views

I am a beginner in this field, and I was thinking about brute force strategies to break symmetric key encryption. Let's say we have a block cipher in CTR mode and the key is 56 bits in size. What ...
anon's user avatar
  • 1
1 vote
2 answers
389 views

Assuming I encrypt data with AES-128 and a random 8-byte key x in the following way: ...
mike's user avatar
  • 51
1 vote
1 answer
70 views

For a cryptographic primitive, we usually see the security level measured in bits, where n-bit security means that the attacker would have to perform $2^n$ operations to break it. For key-derivation ...
Modal Nest's user avatar
  • 1,473