Newest Questions
32,055 questions
1 vote
0 answers
6 views
Rationale for SP 800-56Cr2 ordering of shared secrets in hybrid schemes
In TLS, mlkem768x25519 derives a master shared secret from a concatenation of the x25519 shared secret and the ML-KEM shared secret. The FIPS-approved hybrid PQC key agreement algorithm, ...
2 votes
1 answer
6 views
What gives Streamlined NTRU Prime a smaller attack surface than ML-KEM?
Both ML-KEM (Kyber) and Streamlined NTRU Prime are post-quantum KEMs that achieve IND-CCA2 security. According to DJB's website, Streamlined NTRU Prime is designed to minimize the complexity of a ...
0 votes
0 answers
19 views
Safe Secret Data Exfiltration [closed]
Consider the following problem: we have two parties: Alice and Bob Alice has some sensitive data D (for Data) that she does not want to reveal to Bob Bob has some sensitive code C (for Code) that he ...
0 votes
0 answers
20 views
Is it true that if Miller inversion is easy, then the Weil pairing inversion is easy on BN curves?
I was given the following explaination, some parts of it are wrong but others looks truethefull: Here is the rigorous mathematical explanation of why this technique works. The validity of the formula $...
4 votes
1 answer
399 views
Most efficient discrete log algorithm for RFC3526 primes?
I have been using lifted ElGamal for my binary choice encryption into an exponent $g^m$, where m=0 or m=1. After ciphertext aggregation and decryption I got a message as $g^{m1+m2+m3+...+mn}$ and I ...
1 vote
0 answers
50 views
Definition of UC security
Universally composable (UC) security is defined in the ideal/real model paradigm. In this paradigm, a real protocol $\Pi$ is defined to be secure when the outputs of this protocol are ...
2 votes
1 answer
142 views
Question about some details in SQIsign signing algorithm
The reference is Algorithm 4.2 on page 40 in this document https://sqisign.org/spec/sqisign-20250707.pdf. I'm confused by lines 28-33. We have $I_{com,rsp}$ correspond to the isogeny $\varphi_{rsp}^{...
0 votes
0 answers
40 views
How to choose the the generator point and the order for my dummy elliptic curve? [closed]
To get a grasp on Elliptic Curve cryptography I would love to perform all the steps of creating a set of domain parameters myself. For that reason I chose a prime $p = 1099511627689$ and now I need to ...
2 votes
1 answer
108 views
Is it sound to derive per-file XChaCha20-Poly1305 keys with HKDF using the nonce as salt and an application context in info?
I’m using XChaCha20-Poly1305 as an AEAD cipher and I’d like to derive a separate encryption key for each encrypted file from a single long-term master key. My idea is to use HKDF-SHA256 as follows: ...
5 votes
1 answer
349 views
Feed-forward connection in sponge construction
In the standard Keccak hash function, the sponge construction is used with Keccak-f permutation as the internal transformation. Since Keccak-f is efficiently invertible, we can walk back the internal ...
1 vote
1 answer
99 views
PRGs and non linear FSRs
My understanding is that we can formally prove that PRGs can generate a polynomial length pseudorandom expansion of the seed. But don't the FSRs with non linear feedback like Trivium claim to generate ...
0 votes
0 answers
32 views
Request for review: AEAD-based file container “BMSC v6” for text/PDF data [closed]
I’m a software developer (not a cryptographer) and I know the usual advice “don’t roll your own crypto”. I am NOT proposing a new cipher; instead, I built a simple file container on top of standard ...
4 votes
0 answers
97 views
Hash function with lightweight ZKP of a preimage
For a standard hash function $H$ like SHA-256, one can choose a secret message $M$, compute and publish $h=H(M)$, then prove knowledge of the preimage $M$ in zero knowledge [that is without disclosing ...
2 votes
1 answer
86 views
FHE - CKKS: Why additional modulus reduction is needed in rescale instead of naive division by scaling factor and rounding
I’m currently studying FHE, specifically CKKS, as part of a seminar. I understand most of it, but I’m still stumbling over one issue that I haven’t found a clear explanation for online. Here’s the ...
0 votes
1 answer
56 views
Why does the zero-knowledge property only require distribution of transcripts to be indistinguishable rather than requiring the order of messages?
I still do not understand the security model when proving the zero-knowledge property. Take the Sigma protocol as an example: In the book Proofs, Arguments, and Zero-Knowledge (Section 12.2.1), the ...