Skip to main content

Questions tagged [multiple-encryption]

Multiple encryption means encrypting a message two or more times using either the same, or a different algorithm.

2 votes
1 answer
224 views

I am looking for an Encryption that is Associative and Commutative, akin to how medieval bankers allegedly sent money between each other: Alice put the money in a chest, and locked it with her ...
Henrick Hellström's user avatar
0 votes
2 answers
202 views

I am considering that there may be two ways to have a crypto broken: The crypto algorithm may age and become vulnerable by applying advanced cryptanalysis methods, just like what happened with old ...
Rafael's user avatar
  • 165
3 votes
1 answer
797 views

The question I'm wondering is whether the AES cipher is a closed cipher (which is equivalent to AES being a group). And this question interests me due to the lack of understanding of whether it is ...
Ss1996's user avatar
  • 53
2 votes
1 answer
234 views

I'm looking for maximum possible security. My current scheme is xChaCha20-Poly1305-xSalsa20-Poly1305-AES-CBC-HMACSHA-512. Does combining these algorithms increase security if implemented correctly? ...
bismofunyuns's user avatar
0 votes
0 answers
86 views

First of all a couple of things: I am aware that cascade encryption tries to solve a problem that isn't present often. Attacks are more likely to be mounted against implementation details instead of ...
blaze5641's user avatar
2 votes
3 answers
689 views

I'm researching to see if there is an algorithm that encrypts different inputs with different keys to produce the same output. So let's say I have 2 messages. ...
johnny 5's user avatar
  • 123
1 vote
0 answers
54 views

I'm looking for a mechanism for a type of cert/key signing, where multiple keys need to sign/encrypt something, and a final key/method does not product a valid confirmation unless all those keys did ...
New Alexandria's user avatar
1 vote
1 answer
179 views

I’ve read a lot of articles and a lot of questions here to understand how the encryption is done in garbled circuits. As I understand double encryption is to encrypt the gates and the truth table. The ...
HATİCE MELİSA ERYILMAZ's user avatar
2 votes
1 answer
344 views

As I know, the best attack on single or double Even-Mansour scheme is N/2, being N the key size (or size of one of the two keys used). I know that encrypting two times using this scheme is susceptible ...
phantomcraft's user avatar
1 vote
1 answer
375 views

Multiple Encryption For Multi-Key Security I have a hypothetical question about multiple encryption after reading Matthew Green’s blog on multiple encryption. For those who are familiar with GCM…I ...
JeffT's user avatar
  • 11
0 votes
0 answers
81 views

Let's suppose I take a cipher with key size equal to the block size (Threefish). I XOR a random block in the ciphertext, encrypt with a key, XOR another random block, encrypt again with another key ...
phantomcraft's user avatar
0 votes
1 answer
353 views

I read it once on a page (I don't remember the link and I coundn't find it) that said about a cascade of AES with two 256-bits keys and that it provides 384-bits of security. Maybe not 512-bits of ...
phantomcraft's user avatar
0 votes
0 answers
84 views

When we use a secret sharing scheme we usually want to reconstruct the polynomial function $p(x)\in\mathbb{Z}_q[X]$ with the Lagrange interpolation method and then compute $s=p(0)=a_0$. However, the ...
Hunger Learn's user avatar
2 votes
1 answer
168 views

Some block cipher modes of operation use only encryption processes, such as CFB, OFB and CTR. If doing multiple encryptions using them, will these encipherment schemes be vulnerable to Meet-in-the-...
phantomcraft's user avatar
2 votes
1 answer
350 views

This is a beginner's question related to general security, but it fits cryptography exchange because it's more specific to the action of cryptographic attacks and how they work. Assume the following ...
RobbB's user avatar
  • 199

15 30 50 per page
1
2 3 4 5
8