Newest Questions
32,059 questions
1 vote
0 answers
18 views
Typesetting games with Cryptocode
My question is more about typesetting than about crypto. I work with Cryptocode package in $\LaTeX$ and want to generate discription of games with oracles. My goal ...
1 vote
0 answers
32 views
Elliptic curve cryptography on integers mod p^2
I'm trying to solve the discrete log problem in this context : I have a curve given by a short Weirstrass equation : $y^2 = x^3+ax +b$ where the point addition and scalar multiplication are done ...
0 votes
0 answers
30 views
Questions about starting a security business [closed]
brothers. I'm a 21-year-old college student studying security and cryptography in South Korea. When I first encountered quantum computers a few years ago, I didn't pay much attention, but seeing the ...
0 votes
1 answer
69 views
Is Diffie-Hellman in $\mathsf{NP}\cap\mathsf{coNP}$ without discrete log witness?
Given prime $p$, generator $g$ of $\mathbb Z_p^*$ and $h_1,h_2,h_3\in\mathbb Z_p^*$ is $$\log_ph_3=(\log_ph_1)(\log_ph_2)$$ where at every $i\in\{1,2,3\}\mbox{ }g^{\log_ph_i}\equiv h_i\bmod p$ holds? ...
2 votes
2 answers
99 views
Rationale for SP 800-56Cr2 ordering of shared secrets in hybrid schemes
In TLS, mlkem768x25519 derives a master shared secret from a concatenation of the x25519 shared secret and the ML-KEM shared secret. The FIPS-approved hybrid PQC key agreement algorithm, ...
4 votes
1 answer
134 views
What gives Streamlined NTRU Prime a small attack surface?
Streamlined NTRU Prime (SNTRUP) is a post-quantum KEM that achieves IND-CCA2 security. According to DJB's website, Streamlined NTRU Prime is designed to minimize the complexity of a thorough security ...
0 votes
0 answers
30 views
Safe Secret Data Exfiltration [closed]
Consider the following problem: we have two parties: Alice and Bob Alice has some sensitive data D (for Data) that she does not want to reveal to Bob Bob has some sensitive code C (for Code) that he ...
0 votes
0 answers
23 views
Is it true that if Miller inversion is easy, then the Weil pairing inversion is easy on BN curves?
I was given the following explaination, some parts of it are wrong but others looks truethefull: Here is the rigorous mathematical explanation of why this technique works. The validity of the formula $...
4 votes
1 answer
425 views
Most efficient discrete log algorithm for RFC3526 primes?
I have been using lifted ElGamal for my binary choice encryption into an exponent $g^m$, where m=0 or m=1. After ciphertext aggregation and decryption I got a message as $g^{m1+m2+m3+...+mn}$ and I ...
1 vote
0 answers
53 views
Definition of UC security
Universally composable (UC) security is defined in the ideal/real model paradigm. In this paradigm, a real protocol $\Pi$ is defined to be secure when the outputs of this protocol are ...
2 votes
1 answer
148 views
Question about some details in SQIsign signing algorithm
The reference is Algorithm 4.2 on page 40 in this document https://sqisign.org/spec/sqisign-20250707.pdf. I'm confused by lines 28-33. We have $I_{com,rsp}$ correspond to the isogeny $\varphi_{rsp}^{...
0 votes
0 answers
43 views
How to choose the the generator point and the order for my dummy elliptic curve? [closed]
To get a grasp on Elliptic Curve cryptography I would love to perform all the steps of creating a set of domain parameters myself. For that reason I chose a prime $p = 1099511627689$ and now I need to ...
2 votes
1 answer
112 views
Is it sound to derive per-file XChaCha20-Poly1305 keys with HKDF using the nonce as salt and an application context in info?
I’m using XChaCha20-Poly1305 as an AEAD cipher and I’d like to derive a separate encryption key for each encrypted file from a single long-term master key. My idea is to use HKDF-SHA256 as follows: ...
5 votes
1 answer
356 views
Feed-forward connection in sponge construction
In the standard Keccak hash function, the sponge construction is used with Keccak-f permutation as the internal transformation. Since Keccak-f is efficiently invertible, we can walk back the internal ...
1 vote
1 answer
101 views
PRGs and non linear FSRs
My understanding is that we can formally prove that PRGs can generate a polynomial length pseudorandom expansion of the seed. But don't the FSRs with non linear feedback like Trivium claim to generate ...
0 votes
0 answers
32 views
Request for review: AEAD-based file container “BMSC v6” for text/PDF data [closed]
I’m a software developer (not a cryptographer) and I know the usual advice “don’t roll your own crypto”. I am NOT proposing a new cipher; instead, I built a simple file container on top of standard ...
4 votes
0 answers
104 views
Hash function with lightweight ZKP of a preimage
For a standard hash function $H$ like SHA-256, one can choose a secret message $M$, compute and publish $h=H(M)$, then prove knowledge of the preimage $M$ in zero knowledge [that is without disclosing ...
2 votes
1 answer
97 views
FHE - CKKS: Why additional modulus reduction is needed in rescale instead of naive division by scaling factor and rounding
I’m currently studying FHE, specifically CKKS, as part of a seminar. I understand most of it, but I’m still stumbling over one issue that I haven’t found a clear explanation for online. Here’s the ...
0 votes
1 answer
59 views
Why does the zero-knowledge property only require distribution of transcripts to be indistinguishable rather than requiring the order of messages?
I still do not understand the security model when proving the zero-knowledge property. Take the Sigma protocol as an example: In the book Proofs, Arguments, and Zero-Knowledge (Section 12.2.1), the ...
4 votes
2 answers
443 views
Is Autonomous (OTP) One-Time Pad Establishment Feasible?
Is there a way for two parties, Alice and Bob (consider they are two remote systems communicating over an untrusted network), to establish or agree on a one-time pad (OTP) in an autonomous way? I mean:...
1 vote
1 answer
98 views
Exchanging DH public keys in encrypted handshake packets, during the authentication step - bad idea?
This question is purely to satisfy my curiosity - I'm not attempting to implement my own encryption, I'm just curious. Let's say Alice and Bob establish a communication channel, and the first thing ...
2 votes
0 answers
72 views
Slack in bounds between LWE problem and LWE Sigma protocol extractor
I'm considering the following Sigma protocol based on Lyubashevsky's paper (https://eprint.iacr.org/2024/1287.pdf). We are given public key $A,b=As+e$ for $A \in \mathbb Z^{n\times m}$ and private key ...
4 votes
2 answers
583 views
Is it safe to ASN.1 encode big integer as ASN.1 OCTET STRING, instead of ASN.1 INTEGER?
I wish to have common ASN.1 encoding for all my numerical primitives, whether it is big int or encoded elliptic curve point. Almost always big ints are encoded as ASN.1 INTEGER, but I wish to encode ...
2 votes
0 answers
48 views
Distribution of uniform matrix and discrete Gaussian matrix
I get a statistically close to random matrix $A$ and a trapdoor over $\mathbb Z_q^{n \times m}$ using a trapdoor preimage sampler. Lets say I want to sample a short preimage for some other matrix $U$ ...
0 votes
0 answers
11 views
Can you get hired as a cryptographer without a college degree? [migrated]
I have a question that needs answering. I am currently in the middle of changing careers and have some interest in the tech field. Earlier this year, I made a list of jobs/careers that I wanted to ...
2 votes
3 answers
275 views
Keccak SHAKE subsequent fetch can be considered as valid PRNG?
I have read the Keccak team document about PRNG. When you hash with Keccak SHAKE the amount of random bytes you wish to return is unlimited, i.e. I can fetch() as ...
0 votes
4 answers
162 views
What type of digital signatures are used in e-commerce? [closed]
I'm a new student IT. I need to understand the typical digital signatures, such as DSS, DSA or other in e-commerce.
2 votes
1 answer
69 views
Secure backup GPG private key using Secret Sharing?
Is there a way to generate a backup of a GnuPG private key (without encryption) using any kind of Secret Sharing (like Shamir's Secret Sharing Scheme)? The idea is getting something that can be ...
3 votes
1 answer
432 views
In Schnorr's protocol, why the form of response is `z=r+cx` instead of `z=cr+x`?
"In the third step of the Schnorr protocol, the prover's response takes the form $z=r+cx$. Why can't this form $z=cr+x$ work? I found these answers 1 and 2 are related to my questions However, ...
9 votes
2 answers
2k views
Speculative Question on NSA total storage capacity
This is a speculative question that may be hard to answer reliably. Apologies. According to a Techcrunch article linked here A stunning report in Forbes today detailed that the NSA’s rapidly ...