Newest Questions

1 vote
0 answers
680 views

I'm currently reverse engineering a program that uses Curve25519 key exchange in network communication. I have only a basic understanding of ECC, so maybe this thing just seems strange to me. The ...
BuddyYuz's user avatar
6 votes
1 answer
816 views

A common approach to make (secure computation) protocol descriptions and proofs simpler is to describe them in a hybrid model, where the protocol in the real world has access to some auxiliary ideal ...
Cryptonaut's user avatar
  • 1,106
1 vote
1 answer
1k views

I have a simple question: Are we certain that the md5 hashing algorithm can produce $2^{128}$ different outputs ? If so, how ? Note: Sorry if this has already been asked, I really couldn't find it.
Lynesth's user avatar
  • 11
2 votes
1 answer
1k views

Some time ago I faced the problem of the unexpected format compression of the points on elliptic curve. I used ECDH procedure with a third party service on the base of the $\mathbb({F}_{2^m})$ curve ...
Rotvik Knuzich's user avatar
2 votes
0 answers
205 views

I have a requirement to generate and share unique symmetric keys for a large numbers of small data objects. In many cases the storage and retrieval of the key for each object will be a significant ...
Neil's user avatar
  • 121
0 votes
2 answers
189 views

Given the following Trap-door Commitment scheme Secret key receiver: $x_B \in_u Z_q$ Public key receiver: $y_B = g^{x_B} \mod p$ Here, $p=q*k+1$ for two primes $p,q$ and $k \in Z$. And $g$ is the ...
Crypto Learner's user avatar
1 vote
1 answer
1k views

I'm new to cryptography, so I was searching for a forgery attack, but unable to find anything. Can anybody tell me the difference between forgery attack and user impersonation attack?
Kamran Zaman's user avatar
2 votes
1 answer
1k views

I have a question regarding the resulting sizes of the blocks and shift registers in Cipher Feedback Mode. In the web there are different pictures to illustrate the CFB-mode. Now on the first picture ...
stofuser91's user avatar
-2 votes
1 answer
143 views

Hi I am very new to this field and I was wondering how one would prove or disprove the following statements: 1) if the DH key exchange protocol is secure for a finite cyclic group G, then computing ...
math_18182's user avatar
1 vote
0 answers
156 views

Is there a well maintained, preferably documented, Sigma protocols compiler library? i.e. takes an abstraction of statements to prove, and outputs a cryptographic protocol between verifier and prover? ...
oleiba's user avatar
  • 377
4 votes
1 answer
305 views

I plan to use GPG to encrypt a small file (32KB) for very many recipient public keys (few thousands). I tested GPG with RSA and then ECDH public key encryptions. If RSA is very slow, with ECDH (nist ...
stefanix's user avatar
  • 317
1 vote
1 answer
4k views

We are working on the web application that is basically generating a self-signed certificate during the installation. It's a Java based app and for generation of the certificate we are using ...
macosxgeek's user avatar
1 vote
1 answer
241 views

Let's assume we have the q-ary lattice $$ \mathcal{L}_q({\bf A})=\{ {\bf z}\in \mathbb{Z}^{n} : \exists {\bf s}\in \mathbb{Z}^{n}_{q} \ , \ {\bf z}={\bf A s}^{T} \mod q \},$$ where ${\bf A}\in \...
Mike Anast's user avatar
-1 votes
1 answer
1k views

I make research about big numbers in finite fields and I need to calculate a cube root modulo prime P for the number N: ...
Denis Leonov's user avatar
5 votes
1 answer
358 views

I have a scenario where entity $A$ has an unauthentic copy of the public key $P_B$ of $B$ and an authentic copy of $P_C$ of $C$, trusted by both $A$ and $B$. Now $A$ wants to establish trust in $P_B$...
jatoko's user avatar
  • 51

15 30 50 per page