Skip to main content

Questions tagged [nonce]

A "nonce" is an arbitrary number or string used only once within the context of a specific cryptographic scheme. Nonces are used e.g. in authentication protocols to prevent replay attacks, as well as in stream ciphers (including CTR mode) to avoid keystream reuse.

3 votes
0 answers
111 views

I'm looking at using AES-256-GCM to encrypt data at rest (in a database) with logged-in user id's (among possibly other things) as the authenticated data. I'd like the application to (eventually) ...
ManRow's user avatar
  • 373
1 vote
0 answers
92 views

This question stems up from my recent research work, I've tried different methods. Is it possible to accurately know or get the parity (even or odd) of k (nonce) using r, s and z? If yes, please ...
иυэł's user avatar
0 votes
0 answers
95 views

There are a lot of papers on how to recover a private key from a nonce leakage in an ecdsa signature given a signed message. The fewer bits are known the more signatures are required. If I don’t know ...
user2284570's user avatar
0 votes
1 answer
157 views

It’s well known that in ECDSA, if two signatures are created using the same private key and the same nonce k, the private key can be recovered due to the linear ...
user2284570's user avatar
1 vote
0 answers
111 views

There have been a few Q&As on this site regarding whether fixed (e.g., all-zero) nonces are safe with key rotation every encryption and some mention of protocols, like TLS, incorporating ...
samuel-lucas6's user avatar
1 vote
1 answer
210 views

We do know about the common case or vulnerability of the nonce reuse in two signatures of an address transaction which leads to calculation of $k$ and retrieval of the private key. Apart from that ...
иυэł's user avatar
0 votes
1 answer
154 views

I'm kind of confused about this issue of nonce reuse, don't mind me cuz I'm a newbie, ok first let me explain in details my case, I have a peculiar scenario of a nonce reuse different from the normal ...
иυэł's user avatar
0 votes
1 answer
210 views

I have a question regarding nonce (r) reuse in ECDSA signatures and the potential risk of private key leakage. Specifically, I'm looking into transactions using P2PKH addresses and whether reusing the ...
Peakyblindrs's user avatar
1 vote
3 answers
306 views

I'm creating a protocol for securely sharing files peer to peer. I will use RSA OAEP to perform a handshake between peers, then use AES GCM to share the files. I watched this video about how GCM works ...
Vexcess's user avatar
  • 11
1 vote
1 answer
240 views

I'm trying to understand exactly what nonce-misuse AES-GCM-SIV mode mitigates. Wikipedia says, "In the event a nonce is misused (i.e., used more than once), nothing is revealed except in the ...
hunter's user avatar
  • 4,051
1 vote
0 answers
65 views

What is the point of having dedicated tweakable block ciphers in lieu of XEX which does the same? Does this have something to do with why no one uses XEX with a simple counter? The tweak schedule is ...
Amanda Lars's user avatar
4 votes
2 answers
467 views

I'm looking for a way to encrypt nonces that include a timestamp, to prevent them from leaking information. The nonces are uniquely generated in 64/96/128 bits variants. I would like the encryption to ...
Juul's user avatar
  • 43
2 votes
1 answer
155 views

In every stream cipher (where applicable) that I know of the counter is always separate from the nonce. What is the reason for why the counter is not just part of the nonce and addition is modulo 64? ...
wakefulmemory's user avatar
2 votes
3 answers
745 views

AES-CTR and authenticated variants tend to have a 'problem' with lacking bit real-estate for nonce & counter. Why hasn't an AES-512 variant been standardized at some point? It would allow moving ...
Angelica's user avatar
1 vote
0 answers
36 views

In request/response communication, replay protection can be implemented by exchanging a random number. For example, in its secure request, a client sends a random UID (nonce) to the server in addition ...
SBond's user avatar
  • 143

15 30 50 per page
1
2 3 4 5
15