Newest Questions
31,714 questions
-1
votes
1
answer
22
views
Found collision in fnv132 hash
I'm experimenting with hash functions in PHP using the built-in hash() function... and I've stumbled upon something interesting: I have found collision in fnv132 ...
0
votes
1
answer
22
views
Would re-ordering encoded text be more secure?
I use a cipher for enciphering logins and passwords in plain text - the key is long. I have also added code that detects if any patterns occur so that they can be removed. For example:
...
0
votes
0
answers
16
views
Are qr codes secure from brute force?
I recently came across a blurry qr code which i am trying to recover some information from, So i wondering if i would know the total squares of the qr code i would brute force the black and white ...
4
votes
1
answer
327
views
Why was the value of modulus (q) chosen small in KYBER and large in DILITHIUM?
In the KYBER key agreement algorithm, the mathematical condition dictates that $n|q-1$ and for the NTT implementation, the value of $q$ was chosen to be $3329$. In the DILITHIUM digital signature ...
2
votes
1
answer
42
views
About obfuscating re-encryption: the first construction is not a obfuscator
An intuitive understanding of obfuscated re-encryption:
A third party with a re-encryption program learns no more from the re-
encryption program than from interaction with a black-box oracle that
...
2
votes
0
answers
37
views
Change KYBER KEM parameters
It seems that in the KYBER KEM algorithm, by changing some parameters (or subfunctions), higher speed can be achieved, of course, security is sacrificed a little! For example, the type of distribution ...
0
votes
0
answers
43
views
Master-slave encryption/decryption keys
Are there any cryptosystems capable of having a hierarchy of keys wherein parent keys can decrypt ciphertexts made using descendant keys?
1
vote
1
answer
56
views
Proving that one discrete logarithm is the square or inverse of another one
In Proof systems for general
statements about discrete
logarithms, at the very end, under "open problems", the authors have this sentence:
An interesting open problem is the design of ...
1
vote
1
answer
46
views
Is it obvious that if Enigma Ring settings are displayed in the Indicator Windows, the Enigma will encode identically up until a turnover?
Analysis of Enigma rotors show that the 'ring' setting aligns the 'ring' letter with the 'A' pin of the rotor. And based on the design of the Enigma, the 'A' contact of the Entry Wheel ETW is aligned ...
0
votes
1
answer
89
views
For AES-GCM, why do protocols not use the nonce to prevent replay attacks?
For protocols using AES-GCM, it appears to be common practice to store the sequence number in the additional authenticated data (AES_GCM and TLS sequence number). I have not found any instances of ...
0
votes
0
answers
27
views
Is it secure distributed secret sharing scheme?
I’m designing/finding a distributed key generation (DKG) protocol without a trusted dealer (and without a reliable broadcast channel), relying on a Byzantine consensus log.
Threshold expected ...
0
votes
0
answers
35
views
i have encrypted a message. can anyone Decrypt it [closed]
Hi People of the internet. I have been playing around and been trying to make my own encryption, and i wanna see how swift you guys can Decrypt it. if at all.
The encrypted message is as follwing:
-7....
1
vote
1
answer
45
views
Cost of TLS (1.3) Handshake using RSA compared to cost of using ECC?
In the TLS 1.3 handshake, the server has to sign stuff in its Hello, and the client has to verify the server's certificate and the signature which uses the certified key. I'm guessing that's a ...
0
votes
0
answers
28
views
How to break truncated linear conguential generator with partial information?
This question is related to these:
1
2
But the answers do not state clearly on how and no example code is given which makes harder for a beginner to understand lattice attack on TLCG.
I have an ...
-1
votes
0
answers
21
views
Developing data mining system with vb using VS 2012 [closed]
How to Go about it From start to finish in a Day