Newest Questions
32,060 questions
0 votes
3 answers
2k views
Recommended minimum entropy for online passwords in 2018
Assume a simple case, that an attacker knows the password creation scheme, and that we're not dealing with state actors, nor with sites which keep passwords in plain text. We're trying to defend ...
2 votes
2 answers
499 views
Lattice generation from basis?
This might be a very short very obvious answer, because I've yet to come across a question similar to mine in my searches. Given a lattice L, with a good base B1 and a bad base B2, what stops an ...
4 votes
3 answers
483 views
Homomorphic & Functional encryption: Mapping unencrypted outputs to encrypted outputs using existing data
Let's assume I have datapiece A which, after being put through a model or neural network, has a known output X in the unencrypted space. When I move datapiece A into an encrypted space, and put it ...
2 votes
3 answers
2k views
Shannon entropy of string, not same in Binary form? But just as good as a password?
This string, "Au+u1hvsvJeEXxky" has a Shannon entropy of 3.75 and a length of 16. The binary form of the string ( derived from Ascii-table ) is: 01000001 01110101 ...
0 votes
1 answer
153 views
Challenging Question for the Build a Secure MAC with Special Properties
We would like to ask you to give a construction for requested scheme which provides those properties or give a proof that is not achievable. [Note that unsuccessful attempts to build such a scheme ...
2 votes
2 answers
385 views
What encryption/decryption method should I use when multiple users should have access to the encrypted information?
Ok, I am in a little bit of cryptographical fix :D I need to figure out a way to encrypt and decrypt data handled by a website. The website is intended only for a certain group of people who will ...
1 vote
0 answers
310 views
Securing MQTT communication
I am building kinda simple IoT project, but I would like to implement good security (just for educational purposes and fun). My plan is to build simple solution where one arduino board reads some data ...
1 vote
1 answer
69 views
Is there something similar to a Bloom filter that allows you to test arbitrary predicates on the set?
As I understand it, if you have a Bloom filter that was generated from the members of a specific set, you can test whether a given bit string is in the set (with some given false positive rate). The ...
-1 votes
1 answer
223 views
Is this construction a secure MAC?
Let $F:\{ 0,1 \}^n \times \{ 0,1 \}^ n \rightarrow Z^*_q $ is a PRF, and $H:\{ 0,1 \}^{2n} \rightarrow \{ 0,1\}^n$ is a secure hash function. Is the following construction $\Pi=(Gen,Mac,Vrfy)$ is a ...
0 votes
1 answer
215 views
correct a corrupted shared key
Suppose we have an almost shared secret. For example if we have a noisy connection to a shared secret source of randomness. So Alice has $k_1$ and Bob has $k_2$ similar but not necessarily identical ...
0 votes
1 answer
560 views
How to use cryptography to assure data integrity?
I only understand assurance of integrity using a hash function. How to use cryptograpy to assure data integrity?
4 votes
1 answer
911 views
Turn a password into a key without using salt
Assume I have a password with sufficient entropy but may not be uniformly distributed, how can I turn the password into a key that can be used for symmetric encryption? I think there is surely such a ...
2 votes
0 answers
88 views
How to envision entropy concentration in HKDF "extract" stage?
RFC 5869: Thus, the goal of the "extract" stage is to "concentrate" the possibly dispersed entropy of the input keying material into a short, but cryptographically strong, ...
0 votes
1 answer
184 views
How to find p,q in this problem?
Suppose \begin{align*} g^r &\equiv h \pmod N, \\ h^s &\equiv g \pmod N, \end{align*} for known $g$, $h$, $r$, $s$, and $N$, but not $\phi(N)$. Then $$g^{r\cdot s - 1} \equiv 1 \pmod N,$$...
0 votes
1 answer
176 views
Scrypt sanity check
I have an implementation of scrypt that doesn’t produce the same output as an online scrypt key generator I found. For example, if I run my own scrypt in a function like this: ...