TransWikia.com
  1. All Categories
  2. Cryptography

Cryptography : Recent Questions and Answers (Page 8)

Find answers to your questions about Cryptography or help others by answering their Cryptography questions.

AES/ECB vs AES/CBC for <16 bytes

AES/ECB is commonly considered "weak" to the point that some static analysis software identifies it as not secure and suggests using AES/CBC instead. The question is: what if size of...

Asked on 10/24/2021 by Andriy Gerasika

1 answer

How to implement arbitrary s-box in a side-channel-free way in C?

This could be a question for CodeReview.SE, but I thought it might require non-trivial cryptographic knowledge to merit it on-topic here. The C language is chosen as it's a common...

Asked on 10/24/2021

0 answer

Should I use self generated or predefined RFC 7919 DH groups?

On a wiki page, archived by now, Mozilla switched from recommending self generated DH groups to the ones predefinded in RFC 7919. The recommendation...

Asked on 10/24/2021 by wedi

1 answer

What's the least computationally expensive way to verify a message is from who they say they are?

We're building an ingame GPS system where only 5 lines of code are executed a second. We're starting to face problems with people spoofing the satellites we use to triangulate....

Asked on 10/24/2021 by AlexAndHisScripts

1 answer

AES-256, CBC, plaintext length is multiple of block size: Does PKCS #7 padding weaken the encryption?

Of course, padding is superfluous when AES with CBC is used if you know that the plaintext length is a multiple of the block size. But does the padding precipitate...

Asked on 10/24/2021

1 answer

Pollard Rho Optimization

One of the most important attacks on Elliptic Curve cryptography is Pollard's Rho method. The effect on security can be seen on SafeCurves. This attack is pretty...

Asked on 10/24/2021

0 answer

How can a collision attack using MD5 be used to break WOTS

It is stated inWinternitz One time signature security that MD5 is not safe for Winternitz due to collision attack. Given that WOTS generates multiple, say 32 private keys...

Asked on 10/24/2021 by evernal

1 answer

Is there any examples of information-theoretic secure MPC for dishonest majority against malicious adversary?

My research is to propose highly secure MPC protocol with some conditions. Especially, I want to consider thatsecurity against malicious (active) adversarydishonest majority settinginformation-theoretic securityI know SPDZ family that achieve...

Asked on 10/24/2021 by shoy700

1 answer

Are the asymmetric roles of the two keys in the elliptical curves the same (as for RSA)? Can they be interchanged indifferently?

More precisely, and as for RSA, is it really true that it is not feasible to recirculate one of the keys knowing ONLY the other with the Elliptic Curves, as...

Asked on 10/24/2021 by Benoit LEGER-DERVILLE

2 answer

Proof of the Diffie-Hellman Key Exchange

Could someone please provide the math proof; $$ ((g^a)bmod p)^b bmod p = ((g^b)bmod p)^a bmod p $$...

Asked on 03/07/2021 by mppub

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP