Related news

Published: 5/12/2016I am in a case where I can not share a mac key, only the encryption key. I need to provide authentication and integrity with the cipher so I would like to send a mac with the cipher. I cannot use AES ... Read moreSource: crypto.stackexchange.com


Published: 5/12/2016In the NIST documentation for the Secure Hash Standard, it says to pad every message by appending the bit "1" to the end of the message, followed by k zero bits, where k is equal to the equation l (le ... Read moreSource: crypto.stackexchange.com

Published: 5/12/2016I was reading secure MPC protocol for finding a secret representation of whether a secret value equals zero, from Catrina and de Hoogh (summarized here ). In the paper, the communication complexity co ... Read moreSource: crypto.stackexchange.com

Published: 5/12/2016Can one calc the 16 subkeys in DES in one step ? I mean that we create for example a new “box“ where we directly permute the key k in 16 subkeys Read moreSource: crypto.stackexchange.com

Published: 5/12/2016For a school project we have been given some example hexadecimal numbers to hash like the following: Len = 2 (in bits) Msg = c0 SHA 256  MD = 1e1cea10a23697dc97b423c259842ac12ee679d6b43f088f3c32b26db ... Read moreSource: crypto.stackexchange.com

Published: 5/12/2016Ioc indicates it's polyalphabetic? It's about 0.46 Odd number of characters in cipher text, smallest factor 13 Only 25 characters Read moreSource: crypto.stackexchange.com

Published: 5/12/2016I want to modify a standard block cipher in the following way. I replace each round key by a key picked at random. Is this block cipher as secure as the original one ? Thank you. EDIT Some missing inf ... Read moreSource: crypto.stackexchange.com

Published: 5/12/2016Codebook appears, if I don't err, to be an antiquitated topic rarely touched upon in discussions of modern cryptography. Couldn't codebook nonetheless be of high practical utility and even be extremel ... Read moreSource: crypto.stackexchange.com

Published: 5/12/2016How the use of unsafe prime in DH key exchange makes DH vulnerable to be broken? can anyone explain to me what is safe prime, and what is the difference between safe and strong prime? How the attacker ... Read moreSource: crypto.stackexchange.com

Published: 5/12/2016Suppose that I have an AES key $K$, and I'm instructed to find a plaintext such that the first 32 bits of the plaintext are some string of bits $S_1$, and the last 32 bits of the ciphertext once the p ... Read moreSource: crypto.stackexchange.com

Published: 4/12/2016I am using ElGamal encryption to encrypt an integer message $m$ as, $E[m]$ = ($g^x$, $g^m.h^x$) Can I write a zeroknowledge proof to prove to a verifier that $m > 0$ ? I can create the bit represe ... Read moreSource: crypto.stackexchange.com

Published: 4/12/2016OneTimePad is information theoretically secure as long as the random number stream is evenly long or longer than the data stream it encrypts, for a "decyphered" message could have been any message w ... Read moreSource: crypto.stackexchange.com

Published: 4/12/2016The Stanford JS Crypto Library appears to be trusted by many people. Unfortunately there isn't a lot of documentation. Their encrypt function is documented as a "simple encryption function" (that's it ... Read moreSource: crypto.stackexchange.com

Published: 4/12/2016This question is an exact duplicate of: polygraphic cipher I have a cipher with an odd number of letters. The thing is that there is no letter "j" in it, so first that comes in my mind is playfair cip ... Read moreSource: crypto.stackexchange.com

Published: 4/12/2016I need some standard cryptographic primitives for a JS project (encryption, hashing, random key generation, etc.) I've spent a few hours looking at different libraries, but I'm not really confident ab ... Read moreSource: crypto.stackexchange.com

Published: 4/12/2016Is there any report on comparing quadratic and number field sieve performance in theory vs actual data for discrete logarithm over primes? Is actual data better than theory in any way unexplained (I t ... Read moreSource: crypto.stackexchange.com

Published: 4/12/2016I'm learning about cryptographic hash functions and know why certain boolean functions were chosen to be used in the compression function of cryptographic hash functions ( older question ). Hash funct ... Read moreSource: crypto.stackexchange.com

Published: 4/12/2016I'm a 12th grade student interested in a science project in cryptography and steganography for my school's science fair. I chose this path of computer science partly because my coding skills are weak ... Read moreSource: crypto.stackexchange.com

Published: 4/12/2016Let us assume that we have a very large number of known plaintexts. How can we prove that $c= DES(K1,M \oplus K2)$ offers no advantage compared to DES? Read moreSource: crypto.stackexchange.com

Published: 4/12/2016I was trying to understand Learning with Errors for Latticebased Cryptography and I came across this. The learning with errors problem is: Given an $m \times n$ matrix $A$ and a vector $b \equiv As + ... Read moreSource: crypto.stackexchange.com

Published: 4/12/2016With this Elgamal variant defined below, we have covered in lecture but I do not still understand how a CCA could work against it. Is the use of the homomorphic nature of the encryption something you ... Read moreSource: crypto.stackexchange.com
Related Hashtags
Most read

New GUARDIANS OF THE GALAXY VOL. 2 Trailer Gives Baby Groot a Role That’s the Bomb
Source: nerdist.com 
The Last Of Us 2 stars Ellie as the playable character and is a story about hate: "she's seen some sh*t"
Source: www.gamesradar.com 
Bella Hadid Smolders in 80’s Fitness Looks for LOVE Calendar
Source: www.fashiongonerogue.com 
Ross, Revere, Asche among 35 new free agents (The Associated Press)
Source: rd.yahoo.com 
Death Stranding TGA 2016 teaser trailer
Source: gematsu.com 
I Interviewed Myself About This Confusing Photo of Gucci Mane and Courtney Love
Source: noisey.vice.com 
U.S. veterans build barracks for pipeline protesters in cold
Source: feeds.reuters.com 
Bail Organa Appears in New Star Wars: Rogue One Clip
Source: www.cbr.com
FACEBOOK