Questions tagged [seed]
The seed tag has no summary.
18 questions
1 vote
0 answers
60 views
How to locate and audit the Layer-3 scrambling (masking/hash/PRNG) function and seed in Pret-a-voter or similar secure voting system source code? [closed]
I am performing a cryptographic audit and reconstruction for a secure voting system inspired by Pret-a-voter. I currently have access to deterministic PRF mapping (Layer-1) and modulo/checksum filter (...
0 votes
0 answers
58 views
How can I find the seed of a pRNG that can run on a cheap microcontroller?
I'm reverse engeneering the communication between an ultrasonic machine and its cartridge. I've succesfully documented the communicacion of other machines, knowing all the information its exchanged ...
0 votes
1 answer
172 views
Is it possible for seed phrases to collide?
I recently read about hierarchical deterministic keys, which allow a single seed to produce multiple private and public keys. In decentralized systems, identity can be represented by a wallet, which ...
1 vote
2 answers
2k views
How do bad actors manipulate game results in real time within 'provably fair' gaming systems?
I've been assigned research involving online gaming companies and their use of cryptographic algorithms to produce 'provably fair' results. The largest player in the industry uses a method involving ...
0 votes
1 answer
122 views
If encrypting with a hash function in counter mode, will the security of this scheme be at most minimal{input,output}?
It's possible to use a hash function as an encipherment scheme if used in counter mode. Let's suppose I take a 64-bytes (512-bits) seed/key and hash it concatenated with counters, and use it as a ...
0 votes
0 answers
104 views
Hashing a seed full of entropy with a cryptographic hash function and emiting a key with the same size as input: can a collision attack occurs?
I read this in the documentation of HighwayHash: By contrast, 'strong' hashes such as SipHash or HighwayHash require infeasible attacker effort to find a hash collision (an expected 2^32 guesses of m ...
1 vote
0 answers
82 views
Public seed expansion for uniform reference strings
Many cryptographic protocols are parameterized by a uniformly random reference string (e.g. the commitment key for Pedersen commitments). Our goal is to publicly generate the random values of this ...
2 votes
0 answers
497 views
Understanding seed phrase, private key, wallet addresses
I have a question about Cryptocurrency wallets like Metamask (soft) or Ledger (hard). How is a 12 or 24 word seed phrase enough to show the same crypto addresses in any crypto wallet that supports the ...