Questions tagged [encryption]
Encryption is the process of transforming plaintext using a cipher into ciphertext to make it unreadable to anyone except those possessing the key. Decryption is the process of transforming that ciphertext back into plaintext, using the key.
4,900 questions
2
votes
0
answers
203
views
I found this weird string of words in the Epstein Files... is it code? [closed]
File number is: EFTA00579440
You can look this up on the DOJ's official website.
I initially thought it was a 2FA since it's 32 words but that doesn't explain the 4 word subject title.
Also the word &...
1
vote
1
answer
87
views
Is this a possible framework to hide the website that is being accessed from the ISP (without a VPN)?
I am a layman in this field, so forgive me if this is not correct. The framework I thought of involves every website having two public keys and two private keys.
Call public keys p and q, and the ...
2
votes
0
answers
126
views
Why we ignore multiplication by root Y of $x^2+x+WZ$ over GF($2^4$). Calculation the inverse of GF(256) using subfields
I have read article about getting the inverse element in the Galois field($2^8$) using subfields GF($2^4$) and GF($2^2$):
GF ($2^2$) by adjoining a root W of $x^2+x+1$ over GF(2);
GF ($2^4$) by ...
3
votes
1
answer
146
views
Time memory tradeoff on block cipher with $T=M=O(\sqrt{N}).$
Given a symmetric key block cipher with an $n-$bit blocklength with $n-$bit key (in ECB mode) let $N=2^n.$
Is there a known time memory tradeoff with $T=M=O(\sqrt{N})$?
Edit: Thinking a little further,...
4
votes
0
answers
151
views
Is my recreation of the RSA-129 challenge (n, e=9007, numeric encoding) faithful to the original?
Note: A live, public implementation of this reconstructed RSA challenge
(with a solver leaderboard) is available here:
https://rsa-challenge.rf.gd
I am attempting to faithfully recreate the historical ...
0
votes
0
answers
115
views
Related precise SAT encoding of SHA-256
Respected mathematicians, I would like to know if there is any GitHub repository that accurately converts SHA-family algorithms into SAT problems. So far, I found the SAT encoder by Saeed Nejati to be ...
1
vote
1
answer
45
views
Can one call transition of tables from unencrypted to encrypted state in MariaDB using the file_key_management plugin key rotation?
In MariaDB it is possible to apply data-at-rest encryption using a plugin called file_key_management. This plugin uses a plain text file containing one ore more keys which are ids assigned like this (...
0
votes
0
answers
52
views
CPA secure scheme without circular security
Construct a public-key encryption scheme which is CPA secure
but not circularly secure, relying only on the existence of public-key encryption
schemes.
This is a problem from my cryptography course ...
4
votes
1
answer
508
views
Most efficient discrete log algorithm for RFC3526 primes?
I have been using lifted ElGamal for my binary choice encryption into an exponent $g^m$, where m=0 or m=1. After ciphertext aggregation and decryption I got a message as $g^{m1+m2+m3+...+mn}$ and I ...
1
vote
1
answer
123
views
Exchanging DH public keys in encrypted handshake packets, during the authentication step - bad idea?
This question is purely to satisfy my curiosity - I'm not attempting to implement my own encryption, I'm just curious.
Let's say Alice and Bob establish a communication channel, and the first thing ...
2
votes
1
answer
148
views
What is the complexity of the Block Korkine-Zolotarev algorithm?
I want to know what is the complexity of the lattice-reduction algorithm (used agains CKKS encryption algorithm) named Block Korkine-Zolotarev (BKZ) algorithm (Curtis et al., 2019)?
ref: https://...
1
vote
0
answers
78
views
How to determine the algorithm used to generate a 48-byte header for encrypted files? [closed]
I am engaged in the translation of encrypted files. I have several files encrypted in the same way.
The files consist of two parts:
48 byte header example - ...
0
votes
2
answers
216
views
How to correctly convert Bitcoin’s double SHA-256 proof-of-work into a CNF satisfiability (SAT) problem? [closed]
Is there any respected mathematician who can correctly transform the double SHA proof-of-work (used in Bitcoin mining) into a satisfiability (SAT) problem, ensuring that the CNF conversion is done ...
3
votes
2
answers
355
views
Value of HSM in Cloud
I'm working in an insurance company. Beyond meeting regulatory compliance requirements, is there really any need to enforce hsm in Azure Key Vault (premium tier). The risk of exposure seems ...
1
vote
1
answer
89
views
Is the complexity of sieve algorithms for SVP really $2^{c n}$ for attacks on CKKS?
I know that Sieve Algorithms are good attacks against CKKS Encryption Techniques.
I want to know the exact expression of the complexity of the Sieve Algorithm attacks, according to Miklós Ajtai, Ravi ...