Questions tagged [cryptanalysis]
Analysis of individual security aspects of a cipher or algorithm, not the security of a cipher or algorithm in general (which would lean towards “algorithm-design”).
1,652 questions
9
votes
2
answers
2k
views
Speculative Question on NSA total storage capacity
This is a speculative question that may be hard to answer reliably. Apologies.
According to a Techcrunch article linked here
A stunning report in Forbes today detailed that the NSA’s rapidly ...
4
votes
1
answer
113
views
Hardcore Predicate for ECDLP
The 1999 paper "The Security of all RSA and Discrete Log Bits" by Hastad and Naslund here states that any block of $O(\log \log N)$ bits where $N=pq,$ of the encrypted RSA output is known to ...
1
vote
0
answers
60
views
What is the scaling difference between the most and least significant byte in a modulo-32 bits lattice?
I have studying the lattice basis construction on most implementation but i couldn't understand the difference between the scaling of the unknown part of the equation, the part we want to find in the ...
0
votes
1
answer
84
views
Finding an efficient covering map secp256k1 (genus 1) to the Jacobian of a higher genus curve
Has there been any significant Research and findings on secp256k1 (genus 1) to the Jacobian of a higher genus curve, so efficient Index Calculus Algorithms can be built
2
votes
1
answer
244
views
Factor multi-prime RSA
I have a multi prime 2043 bit modulus with 8 prime factors, each 256 bit.
...
4
votes
0
answers
109
views
Best public cryptanalysis of KeeLoq
KeeLoq is a proprietary 32-bit block, 64-bit key block cipher based on an 32-bit NLFSR and 64-bit FSR that is very frequently used for wireless car keys. It clocks its NLFSR for 528 rounds to encrypt ...
1
vote
0
answers
35
views
Forensic extraction of Matrix keys from Element Desktop IndexedDB: kdf_info shows None
I’m trying to extract and decrypt the Matrix encryption keys stored by Element Desktop. From reading the Rust SDK crates:
matrix-sdk-indexeddb stores encrypted crypto data in an IndexedDB named ::...
4
votes
4
answers
906
views
Reapplying the Vigenère cipher with different texts acting as key
All I want to know is if I'm onto something or if I'm onto nothing from an outside perspective.
I want to make an "art" project in so the purpose of it is truly relative.
My idea involves ...
8
votes
0
answers
181
views
Cryptanalytic research of North Korean block cipher Pilsung
I'd like to know if there are any papers which study the North Korean block cipher Pilsung. This block cipher is based heavily on AES, but with a few differences including a new key schedule based on ...
2
votes
1
answer
189
views
How to find high probability output differences for modular addition in differential cryptanalysis?
In my introduction to cryptography course I only ever did differential cryptanalysis on ciphers which were completly linear. Now I am analyzing a hash function, where I have to propagate XOR ...
1
vote
0
answers
112
views
NP-hardness of ECDLP
Qi Cheng proved that the minimum distance for elliptic linear codes (AG codes for genus 1 curves) is NP-hard (see https://arxiv.org/abs/cs/0507026).
Any instance of ECDLP for an elliptic curve $E/\...
2
votes
1
answer
350
views
Mapping points between elliptic curves
Let's say you are given an ellipitic curve defined over a finite field, with all of its domain parameters well-defined, e.g. the NIST curves.
How can we go about defining a mapping between this curve ...
2
votes
1
answer
143
views
What types of cryptanalysis should I apply to evaluate a new Morse-code–based encryption algorithm?
I am a student working on cryptography and have designed a custom Morse-code–based symmetric encryption algorithm.
It converts file data into Morse-coded form, applies key-dependent transformations, ...
1
vote
0
answers
40
views
Vector-Based Invertible Neural Networks for Experimental PQC [closed]
Summary
This is an experimental exploration of using high-dimensional vector spaces and invertible neural networks (INNs) to harden classical encryption against potential post-quantum attacks. The ...
2
votes
1
answer
159
views
Can a Successful lattice attack using MSBs be adapted to use LSBs instead?
I am struggling to adjust the code that is used to attack linear recurrence relation with most significant byte of a 32 bit state is known along with other variables, I was able to recover last 24 ...