Most Popular

1500 questions
12
votes
3 answers

Digital Signature using symmetric key cryptography

Generally digital signature is a public key cryptography concept.But it needs high overhead. So is there any publication or link available where 'digital signature using symmetric key' has been explained? Can one generate an algorithm combining the…
12
votes
1 answer

Can one efficiently iterate valid bcrypt hash output values?

bcrypt is an intentionally slow hash algorithm. In my last protocol idea, I wanted to use it to expand a password and then only transfer the bcrypt-hashed password. An efficient attack on this would be an ability to iterate all bcrypt hashes (or…
Paŭlo Ebermann
  • 22,946
  • 7
  • 82
  • 119
12
votes
2 answers

How can I make my cipher show the avalanche effect?

I am a beginner in cryptography. I designed an password based encryption-decryption algorithm, which uses a random salt and a password to encrypt a message. I'm using SHA-512 for hashing, matrix operations for shuffling, bitwise XOR for mixing data…
Avinash
  • 131
  • 1
  • 4
12
votes
3 answers

Using a Non-Random IV with modes other than CBC

The weakness CWE-329 is an interesting problem with CBC mode. However, does this same weakness affect the other modes of operation that rely upon an IV such as: PCBC, CFB and OFB? My gut feeling is, YES. I am wondering if there a consensus on…
Rook
  • 1,506
  • 1
  • 13
  • 22
12
votes
4 answers

Is key size the only barrier to the adoption of the McEliece cryptosystem, or is it considered broken/potentially vulnerable?

A recent paper showed that the McEliece cryptosystem is not, unlike RSA and other cryptosystems, weakened as drastically by quantum computing because strong Fourier sampling cannot solve the hidden subgroup problem. However, in 2008, new parameters…
user46
12
votes
2 answers

What characters does AES output?

From what I understand after testing the Crypto-JS file here: http://crypto-js.googlecode.com/svn/tags/3.1.2/build/rollups/aes.js AES creates encrypted strings that contained letters, both capitalized and lowercase, as well as numbers, division…
Howard Butler
  • 149
  • 1
  • 1
  • 4
12
votes
2 answers

Are CDH and Square-DH equally hard?

CDH problem roughly says that choose $U=g^u, V=g^v$ uniformly at random from cyclic group $G$, it's hard to compute $\operatorname{CDH}(U,V)=g^{uv}$. Square-DH problem roughly says choose $U=g^u$ uniformly at random from cyclic group $G$, it's…
T.B
  • 1,292
  • 13
  • 25
12
votes
3 answers

How to perform authentication without central server in P2P?

How can one be sure that the man who you're talking with is the one who you think he is? i.e. How can one perform authentication in P2P network without a central trust server or Certificate Authority? I'm just wondering how someone can make…
Abzac
  • 263
  • 2
  • 10
12
votes
2 answers

How can I implement the elliptic curve MOV attack myself?

I understand and have implemented elliptic curve signatures in Python without the use of libraries like Sage, and would like to implement the MOV attack against certain weak types of elliptic curves. Even though I understand the mathematical…
Myria
  • 121
  • 1
  • 3
12
votes
4 answers

Did non-military cryptography appear in the 50's and 60's only due to NSA leaks?

I'm not talking about scytale, but encryption like RSA, DES, etc. How exactly did civil cryptography evolve after World War II?
strand
  • 121
  • 4
12
votes
2 answers

Encrypting and obscuring data between site/user without SSL

Im trying to figure out what the best way to encrypt data sent between a webpage and the user(both ways) is, when hosted in an environment that doesn't support SSL. The purpose of encryption would be obscuring content for delivery through filters…
Jayhal
  • 123
  • 1
  • 5
12
votes
4 answers

Do any non-US ciphers exist?

Plenty of ciphers come out of the USA from government research or selection competitions. AES and DES are examples. Are there any public ciphers produced by other states, China or Iran for example? Do you really think they trust AES? EDIT: List of…
user9070
12
votes
4 answers

What is the difference between a 'cipher' and a 'mode of operation'?

What is the difference between the term cipher (a name like RIJNDAEL) and mode of operation (like ECB)? Aren't these both terms for the encryption/decryption technique?
hsuk
  • 229
  • 2
  • 5
12
votes
3 answers

Is Blowfish strong enough for VPN encryption?

I'm looking at an OpenVPN connection between two sites configured to use 128 bit Blowfish in CBC mode, and trying to figure out how to assess the strength, but I just don't know enough of the maths. I could ask this over on Sec.SE, but there I think…
Rory Alsop
  • 675
  • 1
  • 13
  • 24
12
votes
1 answer

Can an RSA private key have several public keys?

Ok, so my cryptography lecturer in University posed this question at the end of the RSA key generation lecture as a brain teaser. I have been thinking about this and I think I have come up with a way ( I am aware it's not practical and very…
sukhvir
  • 255
  • 1
  • 2
  • 7