Questions tagged [encryption]
Encryption is the process of transforming plaintext using a cipher into ciphertext to make it unreadable to anyone except those possessing the key. Decryption is the process of transforming that ciphertext back into plaintext, using the key.
4,766
questions
0
votes
0
answers
9
views
What are the recommended parameters for NTRUEncrypt?
I'm looking into NTRU for the first time and I am confused by the variants and the set of parameters. I'd like to use a secure NTRU-based cryptosystem to have a (plausibly) quantum secure PKE offering ...
3
votes
2
answers
779
views
How do cache-timing attacks determine the secret keys of encryption algorithms?
In cache-timing attacks like prime+probe, attacking programs are able to discover the addresses of a victim program's data in main memory. These attacks are often used to determine the secret keys ...
-2
votes
0
answers
59
views
Project: We're looking for a security / privacy expert to fortify an AI chat application [closed]
Project: We're looking for a security / privacy expert to fortify an AI chat application. Please DM me if you are open to project work. Thank you very much.
Adam
0
votes
0
answers
38
views
Upgrade to BouncyCastle 1.76 causing "CMSException: exception unwrapping key: cannot initialise algorithm parameters" [closed]
Upgrade to BouncyCastle 1.76 causing "CMSException: exception unwrapping key: cannot initialise algorithm parameters: LunaIvParameters: Unsupported engineInit method" error in RSAES-OAEP ...
3
votes
2
answers
514
views
Is ElGamal homomorphic encryption using additive groups works only for Discrete Log ElGamal? What about EC ElGamal?
It is known that in Discrete Log ElGamal encryption, the ciphertext $E$ is encrypted as:
$a\ =\ g^k$, where $k$ - random scalar from $[0,\ p)$, $g$ - group generator
$b\ =\ (Y^k*m)\mod\ p$, where $Y$ -...
2
votes
1
answer
89
views
Implementing password recovery in my app
I have an Android App that stores encrypted data using a key derived from user entered password (PBKDF2). If any user forgets their password, they loose access to all their data. Hence, I am trying to ...
0
votes
0
answers
35
views
Proof of Decryption in a Chinese Remainder Theorem-Based Encryption Scheme
I've been studying a cryptographic scheme that uses the Chinese Remainder Theorem (CRT) for decryption. Here's a brief overview of the encryption and decryption process:
Setup:
Alice chooses two ...
2
votes
1
answer
164
views
Is it possible to abstract an ElGamal encryption for EC and Discrete Log by using a Group Law?
ElGamal encryption for Discrete Log is defined as:
Bob side does:
$Y\ =\ (g^x)\ mod\ P$, where $g$ - generator, $x$ - random value among the group elements and $P$ - prime number, typically ultra ...
0
votes
1
answer
52
views
Is a salt necessary when using a key and an intialization vector during encryption?
I use OpenSSL to encrypt passwords. For that the parameters - $S
$ salt, $K$ key, $IV$ initialization vector are used.
Although the command produces the results, I am not sure if the salt is really ...
1
vote
1
answer
51
views
lattice RLWE encryption and decryption process
I am here trying to solve an issue that I face a lot during solving RLWE.
The issue is that I am not able to retrieve the original message after the decryption process.
I use the following encryption ...
2
votes
2
answers
172
views
Cryptography elements requested for a plot in a story
experts. I am working on a story that involves a terabyte portable drive that has been encrypted by Person 1 and needs to be decrypted by Person 2 (Person 1 is deceased by that point).
Person 1 and ...
5
votes
4
answers
994
views
Encrypting a message by calculating the digits of a complicated irrational number
I have no background in cryptography at all so excuse my ignorance if this is a silly question. I was pondering ways in which I could encrypt a message and I came up with the following idea:
Me and ...
0
votes
0
answers
33
views
Zero-Knowledge Proof of a number being generated "randomly" (similar to a dice roll)
If party1 asks other parties to give a random number, for simplicity, say in a range from 1 to 6 (like in a dice). Is it possible for party1 to ensure that the number received is in a given range and ...
3
votes
2
answers
116
views
Definition of non-interactive non-commiting encryption
I'm having trouble understanding the definition of non-interactive non-committing encryption (NINCE) from the paper Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing ...
1
vote
0
answers
18
views
Mental Poker: Can the shuffle of the deck be done Publicaly by a single player at the start of the game
Ref: Mental Poker Revisited by Barnett and Smart.
I am looking at mental poker problem.
Generally, the shuffling process is done by a single player who starts the game and not by all players.
But, in ...