Skip to main content

Questions tagged [cryptanalysis]

Analysis of individual security aspects of a cipher or algorithm, not the security of a cipher or algorithm in general (which would lean towards “algorithm-design”).

0 votes
0 answers
105 views

I've been researching why the standard approach to finding hash collisions using SAT solvers—specifically encoding $H(x_1) = H(x_2) \land x_1 \neq x_2$ by duplicating the circuit—seems to be ...
KAORU AGUILERA KATAYAMA's user avatar
2 votes
1 answer
130 views

I dont know if this qualifies as a cryptographic question but the equations themselves are from cryptographic implementations. I know this: $x_i = y_i*d+z_i \,mod\, m$ $x_i$ is partially known $m$ is ...
actgroup inc's user avatar
3 votes
1 answer
146 views

Given a symmetric key block cipher with an $n-$bit blocklength with $n-$bit key (in ECB mode) let $N=2^n.$ Is there a known time memory tradeoff with $T=M=O(\sqrt{N})$? Edit: Thinking a little further,...
kodlu's user avatar
  • 25.9k
0 votes
0 answers
49 views

My question is related to this but based on comment of Thomas Pornin. I have: $s_i = (a\;\!s_{i-1}+b_i)\bmod\ m$ where $b_i$ is different 32 bit odd value on every state, so its not constant like $a$ ...
actgroup inc's user avatar
4 votes
0 answers
151 views

Note: A live, public implementation of this reconstructed RSA challenge (with a solver leaderboard) is available here: https://rsa-challenge.rf.gd I am attempting to faithfully recreate the historical ...
Abhrankan Chakrabarti's user avatar
2 votes
0 answers
101 views

I am analyzing a custom 64-bit block cipher implemented as a 4-round SPN. The cipher operates on 8-byte blocks with an 8-byte master key. The S-box, bit permutation, and key schedule are fully ...
Mashal Bhatti's user avatar
0 votes
0 answers
115 views

Respected mathematicians, I would like to know if there is any GitHub repository that accurately converts SHA-family algorithms into SAT problems. So far, I found the SAT encoder by Saeed Nejati to be ...
user avatar
0 votes
1 answer
176 views

I've encoded unconstrained SHA-256 compression as CNF: 512 free input variables: msg_w{i}_b{j} (message bits, LSB-first) 256 output variables: ...
KAORU AGUILERA KATAYAMA's user avatar
2 votes
0 answers
40 views

I'm a bit stuck on the problem mentioned in the title. It seems from the ctf writeup that I am going through and trying to understand. Here is the link for the in depth explanation: https://ctftime....
immigrantswede's user avatar
10 votes
2 answers
2k views

This is a speculative question that may be hard to answer reliably. Apologies. According to a Techcrunch article linked here A stunning report in Forbes today detailed that the NSA’s rapidly ...
kodlu's user avatar
  • 25.9k
4 votes
1 answer
160 views

The 1999 paper "The Security of all RSA and Discrete Log Bits" by Hastad and Naslund here states that any block of $O(\log \log N)$ bits where $N=pq,$ of the encrypted RSA output is known to ...
kodlu's user avatar
  • 25.9k
1 vote
0 answers
66 views

I have studying the lattice basis construction on most implementation but i couldn't understand the difference between the scaling of the unknown part of the equation, the part we want to find in the ...
actgroup inc's user avatar
0 votes
1 answer
111 views

Has there been any significant Research and findings on secp256k1 (genus 1) to the Jacobian of a higher genus curve, so efficient Index Calculus Algorithms can be built
Vdog90's user avatar
  • 1
3 votes
1 answer
371 views

I have a multi prime 2043 bit modulus with 8 prime factors, each 256 bit. ...
wizzbud's user avatar
  • 31
4 votes
0 answers
124 views

KeeLoq is a proprietary 32-bit block, 64-bit key block cipher based on an 32-bit NLFSR and 64-bit FSR that is very frequently used for wireless car keys. It clocks its NLFSR for 528 rounds to encrypt ...
forest's user avatar
  • 16.2k

15 30 50 per page
1
2 3 4 5
111