Top new questions this week:
|
Until recently, my list of what can cause side channels exfiltrating secret data (including data depending on secrets) from code running in a computer was limited to:
Hardware emissions: power (e.g. ...
|
I was introduced to the QR-protocol that shows that a number y is a quadratic residue modulo x through an interactive protocol. The protocol is perfect zero-knowledge but it also proves that the ...
|
I'm going through the Enhanced MR test cited in FIPS 186-5, in which it is mentioned that a composite number can be COMPOSITE WITH FACTOR or COMPOSITE AND NOT A POWER OF A PRIME.
When I tested this ...
|
Definitions:
Let $h$ be a hash function with output size $n$ bytes. Suppose the file $F$ can be divided into chunks of size $n$ bytes $F=f_0+f_1+\dots +f_i$ where the operator "$+$" stands ...
|
What is the most simple, but yet well-known "protocol" to protect a unidirectional channel over air?
Requirements
The protocol should provide common properties like privacy, integrity and ...
|
In cache-timing attacks like prime+probe, attacking programs are able to discover the addresses of a victim program's data in main memory. These attacks are often used to determine the secret keys ...
|
NIST 800-89 Recommendation for Obtaining Assurances for Digital Signature Applications has recommendations for (Explicit) Partial Public Key Validation for RSA which include an example method. It's ...
|
Greatest hits from previous weeks:
|
Given that much of our ECC crypto primitives provide “only” 128-bit security when defined over a 256-bit curve due to pollard-rho, is it then still safe in 2020 to consider 128-bit security safe for ...
|
I got an answer in the related question about Mixcolumn for encryption, but how about decryption?
what will I do?
Because it said that I will used this:
During decryption the Mix Column the ...
|
AES has several different variants:
AES-128
AES-192
AES-256
But why would someone prefer use one over another?
|
I've studied that the Bleichenbacher's CCA attack on PKCS#1 v1.5. is a base to many versions of attacks in the area.
I'm trying to understand that attack, but every explanation I saw starts with the ...
|
I couldn't understand the avalanche effect in DES. Could someone explain how avalanche effect happens in DES
|
What is the currently industry-standard algorithm used to generate large prime numbers to be used in RSA encryption?
I'm aware that I can find any number of articles on the Internet that explain how ...
|
One runtime platform provides an API that supplies PKCS#5 padding for block cipher modes such as ECB and CBC. These modes have been defined for the triple DES, AES and Blowfish block ciphers. The ...
|
Can you answer these questions?
|
Kyber has provided refined estimate for classical attacks in the Section 5.2 entitled "Beyond core-SVP hardness". Kyber utilized leaky-LWE-estimator https://github.com/lducas/leaky-LWE-...
|
Hash functions have a number of properties needed, including the property that no collisions must be able to be found. Generally, if we can find collisions for hash functions, we consider the hash ...
|