Find answers to your questions about Cryptography or help others by answering their Cryptography questions.
I don't think it makes much sense to use RSA keys to authenticate the establishment of symmetric keys with strengths less than their own. From what I know, a 16384-bit...
Asked on 03/02/2021 by Melab
1 answerIs there any example of semi-direct product used in any of cryptographic application? Does it help in choosing integers p, q in RSA?...
Asked on 02/23/2021 by SSA
1 answerI have two devices that use a PSK. One is embedded and extremely resource confined. I'm already using ChaCha20-Poly1305 so it would be "free" to reuse this. There is no...
Asked on 02/23/2021 by mint branch conditioner
2 answerI am using group P-256 on OpenSSL with C++. My understanding was that, if you have a point $xP$ and then calculate (xP)^(-1) with EC_POINT_invert(group, xP_inv, ctx), then when...
Asked on 02/21/2021
0 answerI'm new to OTP and received a challenge.ChallengeContext: A server uses OTP to encrypt and decrypt authentication tokens.Misuse: The server always uses the same key.Objective: Forge a valid token for...
Asked on 02/19/2021 by Irwin
0 answerI feel DSA is vulnerable if k is randomly selected over a small set, example, {1,2,...,2^16 -1}. I am trying to come up with a program where I assume I...
Asked on 02/18/2021 by confused andstuck
0 answerI have considered a $(t,n)$ secret sharing scheme with $n$ secret, say $a1,a2....an$. It's third party secure, but it has inside adversaries. While reconstructing secrets, a group...
Asked on 02/18/2021
1 answerWhat I need is a set of pairs, where the first element of the pair is a 384-bit input (including the sequence of 384 zero bits) and the second element...
Asked on 02/16/2021
0 answerCan a quantum computer with insufficient qubits to factor an integer of a given size make any progress in factoring it? For example, what if a quantum computer is only...
Asked on 02/13/2021 by forest
0 answerLet's say I have a collision resistant hash function $H: {0,1}^* rightarrow {0,1}^n$ and I want to create another collision resistant hash function $H': {0,1}^* rightarrow {0,1}^n$ using...
Asked on 02/09/2021 by doctopus
0 answerGet help from others!
Recent Answers
Recent Questions
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP