Questions tagged [seed]

17 questions
2
votes
1 answer

Correlation among pseudorandom sequences generated from correlated seeds

I want to see and mathematically verify how pseudonoise (PN) sequence generated by LFSR or maximum length codes would correlate (auto-correlation and cross correlation) for seeds of varying correlation. Say, I want to generate $512$ bits of PN…
1
vote
1 answer

Gathering entropy at different times using a cycle counter

For non-cryptographic purposes (which use a HWRNG instead), I implemented into a bare metal program a Xorshift* RNG (Taken from [1], see below for implementation). The RNG is currently seeded with the cycle counter and I'd like to XOR in a second…
a3f
  • 13
  • 4
1
vote
2 answers

How do bad actors manipulate game results in real time within 'provably fair' gaming systems?

I've been assigned research involving online gaming companies and their use of cryptographic algorithms to produce 'provably fair' results. The largest player in the industry uses a method involving a client provided seed, which is then combined…
1
vote
1 answer

Is it safe to derive a Falcon512 key pair from a XOF output?

I'm working on a program that requires multiple key pairs from multiple algorithms to be derived from a single 128-byte master seed. However, I couldn't find an implementation for Falcon512 that allows generating key pairs directly from the seed.…
1
vote
1 answer

Can the last n bitcoin blocks (including transactions) be reliable enough to be used as a seed for a PRNG or an input to a crypto hash-function?

Suggested by u/HolgerBier on reddit Is it unpredictable enough or too difficult to manipulate (as in more than a few hundred million USD) to have a sequence of blocks?
1
vote
0 answers

Public seed expansion for uniform reference strings

Many cryptographic protocols are parameterized by a uniformly random reference string (e.g. the commitment key for Pedersen commitments). Our goal is to publicly generate the random values of this string (in a finite field), and to do so using the…
1
vote
0 answers

Understanding seed phrase, private key, wallet addresses

I have a question about Cryptocurrency wallets like Metamask (soft) or Ledger (hard). How is a 12 or 24 word seed phrase enough to show the same crypto addresses in any crypto wallet that supports the same standard (ie. BIP-39). Can someone unravel…
HankCa
  • 139
  • 5
1
vote
1 answer

Is BLAKE2X suitable for generating keys with any security in bits event if BLAKE2 having only 256/512-bits?

I can generate a key of any security in bits with any hash function from random source with enough entropy by using the following scheme: $$H(00||S) || H(01||S) || H(02||S) || H(03||S) || \cdots$$ /\ H is the hash, S the seed and 00, 01, 02 the…
phantomcraft
  • 887
  • 6
  • 14
1
vote
1 answer

Hashing a seed together with a block counter and using as a encipherment scheme: What scheme is more secure in practice?

This question is related to this (but it is not the same). Let's suppose I have a seed with an entropy of 1024-bits and hash it with a counter using a hash function with one-quarter of the seed size in bits as BLAKE2s (256-bits digest size). I hash…
phantomcraft
  • 887
  • 6
  • 14
0
votes
0 answers

How can I find the seed of a pRNG that can run on a cheap microcontroller?

I'm reverse engeneering the communication between an ultrasonic machine and its cartridge. I've succesfully documented the communicacion of other machines, knowing all the information its exchanged between the two devices, but this case seems to be…
fpp
  • 101
0
votes
2 answers

Does the permutation cycle of a PRNG change completely with different seeds?

Apologies if this seems like a trivial question. I've been learning PRNG and cryptographic basics and I don't think I've found an answer to this question (At least that I understand). My understanding is that a PRNG has an internal state which is…
Fashim
0
votes
1 answer

Is it possible for seed phrases to collide?

I recently read about hierarchical deterministic keys, which allow a single seed to produce multiple private and public keys. In decentralized systems, identity can be represented by a wallet, which can be generated from a seed. Therefore, it is…
0
votes
1 answer

What is the best way to use a string with characters other than numbers as a random seed?

Is this done using cryptographic hashing, or just with a sum of the ASCII codes? A possible use case would be on a video game with random procedural generation, where the game allows users to enter a random seed manually.
user116525
0
votes
1 answer

If encrypting with a hash function in counter mode, will the security of this scheme be at most minimal{input,output}?

It's possible to use a hash function as an encipherment scheme if used in counter mode. Let's suppose I take a 64-bytes (512-bits) seed/key and hash it concatenated with counters, and use it as a encipherment scheme. But the hash function has its…
alpominth
  • 393
  • 2
  • 11
0
votes
0 answers

Hashing a seed full of entropy with a cryptographic hash function and emiting a key with the same size as input: can a collision attack occurs?

I read this in the documentation of HighwayHash: By contrast, 'strong' hashes such as SipHash or HighwayHash require infeasible attacker effort to find a hash collision (an expected 2^32 guesses of m per the birthday paradox) or recover the seed…
alpominth
  • 393
  • 2
  • 11
1
2