Skip to main content

Questions tagged [encryption]

Encryption is the process of transforming plaintext using a cipher into ciphertext to make it unreadable to anyone except those possessing the key. Decryption is the process of transforming that ciphertext back into plaintext, using the key.

0 votes
0 answers
38 views

https://imgur.com/a/ErHmTPz There are more variations than the one present in the image, but the most used letters are certainly present. I tried letter frequency, word searching. The plain text ...
Radu Tudurean's user avatar
0 votes
0 answers
37 views

Construct a public-key encryption scheme which is CPA secure but not circularly secure, relying only on the existence of public-key encryption schemes. This is a problem from my cryptography course ...
minukesis's user avatar
4 votes
1 answer
444 views

I have been using lifted ElGamal for my binary choice encryption into an exponent $g^m$, where m=0 or m=1. After ciphertext aggregation and decryption I got a message as $g^{m1+m2+m3+...+mn}$ and I ...
ojacomarket's user avatar
1 vote
1 answer
106 views

This question is purely to satisfy my curiosity - I'm not attempting to implement my own encryption, I'm just curious. Let's say Alice and Bob establish a communication channel, and the first thing ...
navnav's user avatar
  • 113
0 votes
0 answers
11 views

I have a question that needs answering. I am currently in the middle of changing careers and have some interest in the tech field. Earlier this year, I made a list of jobs/careers that I wanted to ...
Sky's user avatar
  • 1
2 votes
1 answer
120 views

I want to know what is the complexity of the lattice-reduction algorithm (used agains CKKS encryption algorithm) named Block Korkine-Zolotarev (BKZ) algorithm (Curtis et al., 2019)? ref: https://...
John's user avatar
  • 31
1 vote
0 answers
65 views

I am engaged in the translation of encrypted files. I have several files encrypted in the same way. The files consist of two parts: 48 byte header example - ...
Alba's user avatar
  • 11
0 votes
2 answers
148 views

Is there any respected mathematician who can correctly transform the double SHA proof-of-work (used in Bitcoin mining) into a satisfiability (SAT) problem, ensuring that the CNF conversion is done ...
pc gangroli's user avatar
3 votes
2 answers
333 views

I'm working in an insurance company. Beyond meeting regulatory compliance requirements, is there really any need to enforce hsm in Azure Key Vault (premium tier). The risk of exposure seems ...
Seau's user avatar
  • 31
1 vote
1 answer
77 views

I know that Sieve Algorithms are good attacks against CKKS Encryption Techniques. I want to know the exact expression of the complexity of the Sieve Algorithm attacks, according to Miklós Ajtai, Ravi ...
John's user avatar
  • 31
2 votes
0 answers
86 views

(Image-heavy because some background is needed...) For starters, this is for the Pokemon franchise. They're known to use substitution ciphers and Caesar/ROT, reversed text, and a homophonic cipher (A=...
ElementsnStuff's user avatar
0 votes
0 answers
66 views

I have a private wallet backup file from Bitpie/imToken created in June 2023. The new version of the official app no longer supports importing this format. The file content is a JSON object in this ...
MingYang's user avatar
1 vote
1 answer
116 views

For this context, let's say I am using all of the chars in python's sys.maxunicode which is 1114111. My plaintext document that I would like to process is 3000 chars and it's in English ASCII so using ...
Dan's user avatar
  • 113
-3 votes
2 answers
108 views

What is encryption in detail?? Answer this question in depth. I am completely new to this field. The internet uses too many sophisticated terms.
8iu__po's user avatar
1 vote
1 answer
79 views

I would like to implement an HSM-backed KMS server for Kubernetes secrets and Talos Linux disk encryption keys for use in my homelab. I have a SmartCard-HSM EA+ for this purpose. Because of the ...
Scott Colby's user avatar

15 30 50 per page
1
2 3 4 5
327