Questions tagged [encryption]
Encryption is the process of transforming plaintext using a cipher into ciphertext to make it unreadable to anyone except those possessing the key. Decryption is the process of transforming that ciphertext back into plaintext, using the key.
4,905 questions
0
votes
0
answers
38
views
Can someone decipher this supposed pigpen or rosicrucian cipher? [closed]
https://imgur.com/a/ErHmTPz
There are more variations than the one present in the image, but the most used letters are certainly present. I tried letter frequency, word searching. The plain text ...
0
votes
0
answers
37
views
CPA secure scheme without circular security
Construct a public-key encryption scheme which is CPA secure
but not circularly secure, relying only on the existence of public-key encryption
schemes.
This is a problem from my cryptography course ...
4
votes
1
answer
444
views
Most efficient discrete log algorithm for RFC3526 primes?
I have been using lifted ElGamal for my binary choice encryption into an exponent $g^m$, where m=0 or m=1. After ciphertext aggregation and decryption I got a message as $g^{m1+m2+m3+...+mn}$ and I ...
1
vote
1
answer
106
views
Exchanging DH public keys in encrypted handshake packets, during the authentication step - bad idea?
This question is purely to satisfy my curiosity - I'm not attempting to implement my own encryption, I'm just curious.
Let's say Alice and Bob establish a communication channel, and the first thing ...
0
votes
0
answers
11
views
Can you get hired as a cryptographer without a college degree? [migrated]
I have a question that needs answering. I am currently in the middle of changing careers and have some interest in the tech field. Earlier this year, I made a list of jobs/careers that I wanted to ...
2
votes
1
answer
120
views
What is the complexity of the Block Korkine-Zolotarev algorithm?
I want to know what is the complexity of the lattice-reduction algorithm (used agains CKKS encryption algorithm) named Block Korkine-Zolotarev (BKZ) algorithm (Curtis et al., 2019)?
ref: https://...
1
vote
0
answers
65
views
How to determine the algorithm used to generate a 48-byte header for encrypted files? [closed]
I am engaged in the translation of encrypted files. I have several files encrypted in the same way.
The files consist of two parts:
48 byte header example - ...
0
votes
2
answers
148
views
How to correctly convert Bitcoin’s double SHA-256 proof-of-work into a CNF satisfiability (SAT) problem? [closed]
Is there any respected mathematician who can correctly transform the double SHA proof-of-work (used in Bitcoin mining) into a satisfiability (SAT) problem, ensuring that the CNF conversion is done ...
3
votes
2
answers
333
views
Value of HSM in Cloud
I'm working in an insurance company. Beyond meeting regulatory compliance requirements, is there really any need to enforce hsm in Azure Key Vault (premium tier). The risk of exposure seems ...
1
vote
1
answer
77
views
Is the complexity of sieve algorithms for SVP really $2^{c n}$ for attacks on CKKS?
I know that Sieve Algorithms are good attacks against CKKS Encryption Techniques.
I want to know the exact expression of the complexity of the Sieve Algorithm attacks, according to Miklós Ajtai, Ravi ...
2
votes
0
answers
86
views
Unclear cipher type in a video game [closed]
(Image-heavy because some background is needed...)
For starters, this is for the Pokemon franchise. They're known to use substitution ciphers and Caesar/ROT, reversed text, and a homophonic cipher (A=...
0
votes
0
answers
66
views
Seeking KDF parameters for Bitpie/imToken 2023 private backup file in {"data":...} JSON format
I have a private wallet backup file from Bitpie/imToken created in June 2023. The new version of the official app no longer supports importing this format.
The file content is a JSON object in this ...
1
vote
1
answer
116
views
Vigenere understanding and clarification between modulo, key length, plaintext length, plaintext alphabet length?
For this context, let's say I am using all of the chars in python's sys.maxunicode which is 1114111.
My plaintext document that I would like to process is 3000 chars and it's in English ASCII so using ...
-3
votes
2
answers
108
views
What is encryption in general? [closed]
What is encryption in detail?? Answer this question in depth. I am completely new to this field. The internet uses too many sophisticated terms.
1
vote
1
answer
79
views
Implementing a Kubernetes KMS with a Relatively-Limited HSM
I would like to implement an HSM-backed KMS server for Kubernetes secrets and Talos Linux disk encryption keys for use in my homelab. I have a SmartCard-HSM EA+ for this purpose. Because of the ...