Newest Questions
32,052 questions
0 votes
0 answers
24 views
Definition of UC security
Universally composable (UC) security is defined in the ideal/real model paradigm. In this paradigm, a real protocol $\Pi$ is defined to be secure when the outputs of this protocol are ...
2 votes
1 answer
124 views
Question about some details in SQIsign signing algorithm
The reference is Algorithm 4.2 on page 40 in this document https://sqisign.org/spec/sqisign-20250707.pdf. I'm confused by lines 28-33. We have $I_{com,rsp}$ correspond to the isogeny $\varphi_{rsp}^{...
0 votes
0 answers
33 views
How to choose the the generator point and the order for my dummy elliptic curve? [closed]
To get a grasp on Elliptic Curve cryptography I would love to perform all the steps of creating a set of domain parameters myself. For that reason I chose a prime $p = 1099511627689$ and now I need to ...
2 votes
1 answer
79 views
Is it sound to derive per-file XChaCha20-Poly1305 keys with HKDF using the nonce as salt and an application context in info?
I’m using XChaCha20-Poly1305 as an AEAD cipher and I’d like to derive a separate encryption key for each encrypted file from a single long-term master key. My idea is to use HKDF-SHA256 as follows: ...
5 votes
1 answer
334 views
Feed-forward connection in sponge construction
In the standard Keccak hash function, the sponge construction is used with Keccak-f permutation as the internal transformation. Since Keccak-f is efficiently invertible, we can walk back the internal ...
1 vote
1 answer
65 views
PRGs and non linear LFSRs
My understanding is that we can formally prove that PRGs can generate a polynomial length pseudorandom expansion of the seed. But don't the LFSRs with non linear feedback like Trivium claim to ...
0 votes
0 answers
32 views
Request for review: AEAD-based file container “BMSC v6” for text/PDF data [closed]
I’m a software developer (not a cryptographer) and I know the usual advice “don’t roll your own crypto”. I am NOT proposing a new cipher; instead, I built a simple file container on top of standard ...
4 votes
0 answers
81 views
Hash function with lightweight ZKP of a preimage
For a standard hash function $H$ like SHA-256, one can choose a secret message $M$, compute and publish $h=H(M)$, then prove knowledge of the preimage $M$ in zero knowledge [that is without disclosing ...
2 votes
1 answer
66 views
FHE - CKKS: Why additional modulus reduction is needed in rescale instead of naive division by scaling factor and rounding
I’m currently studying FHE, specifically CKKS, as part of a seminar. I understand most of it, but I’m still stumbling over one issue that I haven’t found a clear explanation for online. Here’s the ...
0 votes
1 answer
50 views
Why does the zero-knowledge property only require distribution of transcripts to be indistinguishable rather than requiring the order of messages?
I still do not understand the security model when proving the zero-knowledge property. Take the Sigma protocol as an example: In the book Proofs, Arguments, and Zero-Knowledge (Section 12.2.1), the ...
4 votes
2 answers
429 views
Is Autonomous (OTP) One-Time Pad Establishment Feasible?
Is there a way for two parties, Alice and Bob (consider they are two remote systems communicating over an untrusted network), to establish or agree on a one-time pad (OTP) in an autonomous way? I mean:...
1 vote
1 answer
86 views
Exchanging DH public keys in encrypted handshake packets, during the authentication step - bad idea?
This question is purely to satisfy my curiosity - I'm not attempting to implement my own encryption, I'm just curious. Let's say Alice and Bob establish a communication channel, and the first thing ...
2 votes
0 answers
63 views
Slack in bounds between LWE problem and LWE Sigma protocol extractor
I'm considering the following Sigma protocol based on Lyubashevsky's paper (https://eprint.iacr.org/2024/1287.pdf). We are given public key $A,b=As+e$ for $A \in \mathbb Z^{n\times m}$ and private key ...
4 votes
2 answers
564 views
Is it safe to ASN.1 encode big integer as ASN.1 OCTET STRING, instead of ASN.1 INTEGER?
I wish to have common ASN.1 encoding for all my numerical primitives, whether it is big int or encoded elliptic curve point. Almost always big ints are encoded as ASN.1 INTEGER, but I wish to encode ...
2 votes
0 answers
44 views
Distribution of uniform matrix and discrete Gaussian matrix
I get a statistically close to random matrix $A$ and a trapdoor over $\mathbb Z_q^{n \times m}$ using a trapdoor preimage sampler. Lets say I want to sample a short preimage for some other matrix $U$ ...