TransWikia.com
  1. All Categories
  2. Cryptography

Cryptography : Recent Questions and Answers (Page 7)

Find answers to your questions about Cryptography or help others by answering their Cryptography questions.

A modification of the Blum-Micalli construction

Consider the following modification of the Blum-Micalli construction (denoted by BM): $G_l(x) = f^l(x) || BM^l(x)$ I am asked the following questions about it:Show it is a PRG...

Asked on 10/24/2021

1 answer

Would Triple DES-X with 7 keys be much slower than standard Triple DES?

Since a single hardware pass of an XOR with a 64-bit key is speedy, would Triple DES-X with seven 64-bit keys used in the following manner be virtually identical in...

Asked on 10/24/2021 by Abercrombie Dorfen

1 answer

Publicly verifiable secret sharing scheme

In https://www.win.tue.nl/~berry/papers/crypto99.pdf, Schoenmakers proposes a publicly verifiable secret sharing scheme, that uses a non-interactive DLEQ proof to allow any participant to verify the shares of the secret...

Asked on 10/24/2021 by Fiono

1 answer

DTLS vs direct use of AES. What are the threats unique for direct use of AES instead of DTLS?

For regular traffic in mesh network (between Internet of Thing devices) customer decided to use one of two options:DTLS PSK ciphersuite - DTLS based on pre-shared symmetric...

Asked on 10/24/2021

1 answer

Can someone help me understand this?

In the book Serious Cryptography It says for a cipher's permutation to be secure "Different keys should result in different permutations. Otherwise it becomes easier to decrypt without the key:...

Asked on 10/24/2021 by user80873

1 answer

ZKP for product of two primes

I'm struggling to understand the intuition of the zero knowledge-ness of this proof from the following paper. The proof is a 2 round where the verifier asks...

Asked on 10/24/2021 by yacovm

2 answer

How does second pre-image attack on Merkle Signature Scheme work?

I understand that a second pre-image attack on the Merkle tree works by creating another Merkle tree using the intermediate nodes as the leaf nodes, and this will lead to...

Asked on 10/24/2021

1 answer

Modulo hashing scheme

Let's consider hashing of odd 256-bit number $L$ with 256-bit odd key $K$: $z = (2^{256}-L) cdot K bmod 2^{256}$ $z$ is the hashed number.If ...

Asked on 10/24/2021

0 answer

How do herding attacks on hash functions work?

I read this paper Herding Hash Functions and the Nostradamus Attack, 2005 of Kelsey and Kohno on herding attacks but I do not understand how it works....

Asked on 10/24/2021

1 answer

Has the ECDH protocol been designed just for key exchange or is it widely used for key exchange?

As far as my understanding of the ECDH goes, after systems are encrypted using ECDH protocol, any data that comes out of the first system will be encrypted and can...

Asked on 10/24/2021 by Manish Kaul

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP