1. All Categories
  2. Cryptography

Cryptography : Recent Questions and Answers (Page 2)

Find answers to your questions about Cryptography or help others by answering their Cryptography questions.

Why we can't implement AES 512 key size?

Out of curiosity why we can't implement AES 512 key size? Please explain somehow i can understand! I'm not an expert....

Asked on 12/17/2021 by hamedb71

3 answer

MD5 - Chosen Prefix Collision Attack

Given 2 messages $m_1$ and $m_2$, in a chosen prefix attack, we want to find $s_1$ and $s_2$ such that: $text{MD5}(m_1 ||...

Asked on 12/17/2021

1 answer

Does selectively generating keypairs with particular public-key hash prefix weaken the security?

I'd like to embed 8-bits of information by selecting only keypairs where a hash of the public key begins with those 8-bits. (The expected number of keypairs that will...

Asked on 12/17/2021

2 answer

Difference between polynomial embedding and canonical embedding

Can anyone tell me the difference between working in the polynomial embedding for $R$-LWE, and working in the canonical embedding?...

Asked on 12/17/2021

0 answer

How can Cipher Block Chaining (CBC) in SSL be attacked?

I am trying to understand how CBC-mode in SSL/TLS can be attacked. I have been looking around online but all examples and explanations are very hard to understand and follow....

Asked on 12/14/2021 by antonpug

3 answer

Subset Sum Hashes

This link discusses something called a 'subset-sum hash function'. I'm having a little difficulty understanding the algorithm, and I can't seem to find any existing implementations to...

Asked on 12/14/2021 by Lev Knoblock

1 answer

Why is this authenticated Diffie–Hellman key exchange insecure?

I was searching for the information on authenticated Diffie–Hellman key exchange and found these slides. The author says, “Remember$$Ato B: (A, g^x, operatorname{SIG}_a((g^x, B)))$$...

Asked on 12/14/2021 by beroal

1 answer

Homomorphic encryption scheme for modulo reduction

I want to know if there is any Homomorphic encryption scheme that supports modulo reduction, i.e.,using $Enc_{pk}(m)$ and a public $w$ to compute $Enc_{pk}(m mod w)$....

Asked on 12/08/2021

0 answer

Can we say that password authentication contains registration phase, authentication phase and authenticated key exchange phase?

Authentication aims to validate the legitimate identity. The authenticated key exchange aims to establish a secure common session key. But can we say that password authentication scheme contains the registration...

Asked on 12/06/2021 by Z.P.

0 answer

LWR parameter estimation

I am trying to estimate parameters for LWR $(n,q,p)$ instance using the LWE estimator. My $q,p$ are $283,256$-bit prime numbers and I am trying...

Asked on 12/04/2021 by MeV

0 answer

Ask a Question

Get help from others!

© 2024 All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP