Newest Questions
32,061 questions
1 vote
0 answers
680 views
ECC Curve25519: How to generate this kind of private key? / Strange key exchange mechanism
I'm currently reverse engineering a program that uses Curve25519 key exchange in network communication. I have only a basic understanding of ECC, so maybe this thing just seems strange to me. The ...
6 votes
1 answer
816 views
Secure Computation: Reactive Functionalities in the Hybrid Model for Standalone Security
A common approach to make (secure computation) protocol descriptions and proofs simpler is to describe them in a hybrid model, where the protocol in the real world has access to some auxiliary ideal ...
1 vote
1 answer
1k views
Are MD5 possibilities really $2^{128}$? [duplicate]
I have a simple question: Are we certain that the md5 hashing algorithm can produce $2^{128}$ different outputs ? If so, how ? Note: Sorry if this has already been asked, I really couldn't find it.
2 votes
1 answer
1k views
The compression of the elliptic curve point coordinates
Some time ago I faced the problem of the unexpected format compression of the points on elliptic curve. I used ECDH procedure with a third party service on the base of the $\mathbb({F}_{2^m})$ curve ...
2 votes
0 answers
205 views
Sharing salt for deterministic symmetric key derivation
I have a requirement to generate and share unique symmetric keys for a large numbers of small data objects. In many cases the storage and retrieval of the key for each object will be a significant ...
0 votes
2 answers
189 views
Public-key generation - primes reuse
Given the following Trap-door Commitment scheme Secret key receiver: $x_B \in_u Z_q$ Public key receiver: $y_B = g^{x_B} \mod p$ Here, $p=q*k+1$ for two primes $p,q$ and $k \in Z$. And $g$ is the ...
1 vote
1 answer
1k views
What is the difference between a forgery attack and an user impersonation attack? [closed]
I'm new to cryptography, so I was searching for a forgery attack, but unable to find anything. Can anybody tell me the difference between forgery attack and user impersonation attack?
2 votes
1 answer
1k views
Cipher Feedback Mode - sizes of the blocks and shift registers
I have a question regarding the resulting sizes of the blocks and shift registers in Cipher Feedback Mode. In the web there are different pictures to illustrate the CFB-mode. Now on the first picture ...
-2 votes
1 answer
143 views
Diffie Hellman Key Exchange Security wrt the hardness of discrete Logarithm
Hi I am very new to this field and I was wondering how one would prove or disprove the following statements: 1) if the DH key exchange protocol is secure for a finite cyclic group G, then computing ...
1 vote
0 answers
156 views
Sigma protocol compiler?
Is there a well maintained, preferably documented, Sigma protocols compiler library? i.e. takes an abstraction of statements to prove, and outputs a cryptographic protocol between verifier and prover? ...
4 votes
1 answer
305 views
GPG encrypt performance degradence for thousands receipients [closed]
I plan to use GPG to encrypt a small file (32KB) for very many recipient public keys (few thousands). I tested GPG with RSA and then ECDH public key encryptions. If RSA is very slow, with ECDH (nist ...
1 vote
1 answer
4k views
Which algorithm should be used to replace SHA512withRSA? [closed]
We are working on the web application that is basically generating a self-signed certificate during the installation. It's a Java based app and for generation of the certificate we are using ...
1 vote
1 answer
241 views
Can i use Babai algorithm in q-ary lattice
Let's assume we have the q-ary lattice $$ \mathcal{L}_q({\bf A})=\{ {\bf z}\in \mathbb{Z}^{n} : \exists {\bf s}\in \mathbb{Z}^{n}_{q} \ , \ {\bf z}={\bf A s}^{T} \mod q \},$$ where ${\bf A}\in \...
-1 votes
1 answer
1k views
Cube root modulo prime
I make research about big numbers in finite fields and I need to calculate a cube root modulo prime P for the number N: ...
5 votes
1 answer
358 views
Using nested signatures to trust public key of inner signatures
I have a scenario where entity $A$ has an unauthentic copy of the public key $P_B$ of $B$ and an authentic copy of $P_C$ of $C$, trusted by both $A$ and $B$. Now $A$ wants to establish trust in $P_B$...