Newest Questions
32,051 questions
2 votes
0 answers
47 views
Distribution of uniform matrix and discrete Gaussian matrix
I get a statistically close to random matrix $A$ and a trapdoor over $\mathbb Z_q^{n \times m}$ using a trapdoor preimage sampler. Lets say I want to sample a short preimage for some other matrix $U$ ...
0 votes
0 answers
11 views
Can you get hired as a cryptographer without a college degree? [migrated]
I have a question that needs answering. I am currently in the middle of changing careers and have some interest in the tech field. Earlier this year, I made a list of jobs/careers that I wanted to ...
2 votes
3 answers
271 views
Keccak SHAKE subsequent fetch can be considered as valid PRNG?
I have read the Keccak team document about PRNG. When you hash with Keccak SHAKE the amount of random bytes you wish to return is unlimited, i.e. I can fetch() as ...
0 votes
4 answers
158 views
What type of digital signatures are used in e-commerce? [closed]
I'm a new student IT. I need to understand the typical digital signatures, such as DSS, DSA or other in e-commerce.
2 votes
1 answer
60 views
Secure backup GPG private key using Secret Sharing?
Is there a way to generate a backup of a GnuPG private key (without encryption) using any kind of Secret Sharing (like Shamir's Secret Sharing Scheme)? The idea is getting something that can be ...
3 votes
1 answer
429 views
In Schnorr's protocol, why the form of response is `z=r+cx` instead of `z=cr+x`?
"In the third step of the Schnorr protocol, the prover's response takes the form $z=r+cx$. Why can't this form $z=cr+x$ work? I found these answers 1 and 2 are related to my questions However, ...
9 votes
2 answers
2k views
Speculative Question on NSA total storage capacity
This is a speculative question that may be hard to answer reliably. Apologies. According to a Techcrunch article linked here A stunning report in Forbes today detailed that the NSA’s rapidly ...
5 votes
1 answer
131 views
A lifestyle-based example of simulation-based security
The intuition behind simulation-based security proofs comes from the following idea — if any party participating in a protocol or system can fully simulate the entire interaction process without ...
4 votes
0 answers
59 views
Hardcore Predicate for ECDLP
The 1999 paper "The Security of all RSA and Discrete Log Bits" by Hastad and Naslund here states that any block of $O(\log \log N)$ bits where $N=pq,$ of the encrypted RSA output is known to ...
2 votes
1 answer
113 views
What is the complexity of the Block Korkine-Zolotarev algorithm?
I want to know what is the complexity of the lattice-reduction algorithm (used agains CKKS encryption algorithm) named Block Korkine-Zolotarev (BKZ) algorithm (Curtis et al., 2019)? ref: https://...
5 votes
1 answer
423 views
Provability of security for unbalanced Feistel ciphers?
Luby and Rackoff have shown that a balanced Feistel scheme requires only 4 rounds and is "perfectly" secure as long as the round functions are "random enough". Has any work been ...
2 votes
1 answer
203 views
Complexity of calculating Second Least Significant Bit in Discrete Log Problem?
Consider the discrete Log Problem w.r.t. prime $p$. Given $b, p, r$ find $x$ where: $b^x\bmod p=r$. We are promised that $b^{\frac{(p-1)}2}\bmod p=p-1$. Q1: What is the complexity of calculating the ...
2 votes
1 answer
103 views
In the IND-CPA game, is there an upper bound on the number of queries? [closed]
I'm working on a problem where an encryption scheme like OTP leaks the r-th bit of the key each query where r is a random integer. If an attacker can do an infinite number of queries before the ...
0 votes
0 answers
59 views
How do I display a file on a website and keep it encrypted when it's saved by the user?
My problem is specific: basically I want to have a website that is a gallery of my photos and I want the user to be able to view them, but that is the only access the user has. If they attempt to save ...
6 votes
1 answer
166 views
Lattice construction for small integer root extraction in bivariate Coppersmith technique
I have a bivariate polynomial $f(x,y)\in\mathbb Z[x,y]$ of shape $$f(x,y)=ax^2+bxy+cy^2+dx+ey+f$$ where $abcdef\neq0$ $|x|<X$, $|y|<Y$, $XY<\frac{W^\frac12}{g(N)}$ where $W=\|f(xX,yY)\|_\...