Questions tagged [multiple-encryption]
Multiple encryption means encrypting a message two or more times using either the same, or a different algorithm.
111 questions
2 votes
1 answer
224 views
Associative and Commutative Encryption
I am looking for an Encryption that is Associative and Commutative, akin to how medieval bankers allegedly sent money between each other: Alice put the money in a chest, and locked it with her ...
0 votes
2 answers
202 views
Is it safer to use many encryption softwares/algorithms for encrypting a file?
I am considering that there may be two ways to have a crypto broken: The crypto algorithm may age and become vulnerable by applying advanced cryptanalysis methods, just like what happened with old ...
3 votes
1 answer
797 views
Is AES a group?
The question I'm wondering is whether the AES cipher is a closed cipher (which is equivalent to AES being a group). And this question interests me due to the lack of understanding of whether it is ...
2 votes
1 answer
234 views
Does using multiple encryption algorithms with different keys on the same cipher text improve security?
I'm looking for maximum possible security. My current scheme is xChaCha20-Poly1305-xSalsa20-Poly1305-AES-CBC-HMACSHA-512. Does combining these algorithms increase security if implemented correctly? ...
0 votes
0 answers
86 views
Cascade Encryption with Faulty Inner Layer
First of all a couple of things: I am aware that cascade encryption tries to solve a problem that isn't present often. Attacks are more likely to be mounted against implementation details instead of ...
2 votes
3 answers
689 views
Encrypt different inputs with different keys to obtain the same output
I'm researching to see if there is an algorithm that encrypts different inputs with different keys to produce the same output. So let's say I have 2 messages. ...
1 vote
0 answers
54 views
Is there a type of method where multiple keys are involved, and final key produces invalid results unless all prior keys are used?
I'm looking for a mechanism for a type of cert/key signing, where multiple keys need to sign/encrypt something, and a final key/method does not product a valid confirmation unless all those keys did ...
1 vote
1 answer
179 views
How to encrypt in garbled circuits
I’ve read a lot of articles and a lot of questions here to understand how the encryption is done in garbled circuits. As I understand double encryption is to encrypt the gates and the truth table. The ...
2 votes
1 answer
344 views
What is the security of multiple encryption using Even–Mansour scheme (XEX)?
As I know, the best attack on single or double Even-Mansour scheme is N/2, being N the key size (or size of one of the two keys used). I know that encrypting two times using this scheme is susceptible ...
1 vote
1 answer
375 views
Multiple Encryption Using GCM For Multi-Key Security
Multiple Encryption For Multi-Key Security I have a hypothetical question about multiple encryption after reading Matthew Green’s blog on multiple encryption. For those who are familiar with GCM…I ...
0 votes
0 answers
81 views
Is multiple encryption with XORs between each encryption operation susceptible to meet-in-the-middle attacks?
Let's suppose I take a cipher with key size equal to the block size (Threefish). I XOR a random block in the ciphertext, encrypt with a key, XOR another random block, encrypt again with another key ...
0 votes
1 answer
353 views
Is multiple encryption using CBC mode of operation susceptible to Meet-in-the-middle attacks?
I read it once on a page (I don't remember the link and I coundn't find it) that said about a cascade of AES with two 256-bits keys and that it provides 384-bits of security. Maybe not 512-bits of ...
0 votes
0 answers
84 views
How could this scheme work?
When we use a secret sharing scheme we usually want to reconstruct the polynomial function $p(x)\in\mathbb{Z}_q[X]$ with the Lagrange interpolation method and then compute $s=p(0)=a_0$. However, the ...
2 votes
1 answer
168 views
Is multiple encryption using a block cipher mode of operation that use only encryption processes vulnerable to Meet-in-the-middle attacks?
Some block cipher modes of operation use only encryption processes, such as CFB, OFB and CTR. If doing multiple encryptions using them, will these encipherment schemes be vulnerable to Meet-in-the-...
2 votes
1 answer
350 views
Is there a benefit to "double encryption" when it comes to attacks analyzing attempted decryption results?
This is a beginner's question related to general security, but it fits cryptography exchange because it's more specific to the action of cryptographic attacks and how they work. Assume the following ...