Skip to main content

Questions tagged [encryption]

Encryption is the process of transforming plaintext using a cipher into ciphertext to make it unreadable to anyone except those possessing the key. Decryption is the process of transforming that ciphertext back into plaintext, using the key.

2 votes
0 answers
203 views

File number is: EFTA00579440 You can look this up on the DOJ's official website. I initially thought it was a 2FA since it's 32 words but that doesn't explain the 4 word subject title. Also the word &...
Rohan Alaca's user avatar
1 vote
1 answer
87 views

I am a layman in this field, so forgive me if this is not correct. The framework I thought of involves every website having two public keys and two private keys. Call public keys p and q, and the ...
Ryder Rude's user avatar
2 votes
0 answers
126 views

I have read article about getting the inverse element in the Galois field($2^8$) using subfields GF($2^4$) and GF($2^2$): GF ($2^2$) by adjoining a root W of $x^2+x+1$ over GF(2); GF ($2^4$) by ...
miridonik's user avatar
3 votes
1 answer
146 views

Given a symmetric key block cipher with an $n-$bit blocklength with $n-$bit key (in ECB mode) let $N=2^n.$ Is there a known time memory tradeoff with $T=M=O(\sqrt{N})$? Edit: Thinking a little further,...
kodlu's user avatar
  • 25.9k
4 votes
0 answers
151 views

Note: A live, public implementation of this reconstructed RSA challenge (with a solver leaderboard) is available here: https://rsa-challenge.rf.gd I am attempting to faithfully recreate the historical ...
Abhrankan Chakrabarti's user avatar
0 votes
0 answers
115 views

Respected mathematicians, I would like to know if there is any GitHub repository that accurately converts SHA-family algorithms into SAT problems. So far, I found the SAT encoder by Saeed Nejati to be ...
user avatar
1 vote
1 answer
45 views

In MariaDB it is possible to apply data-at-rest encryption using a plugin called file_key_management. This plugin uses a plain text file containing one ore more keys which are ids assigned like this (...
user214289's user avatar
0 votes
0 answers
52 views

Construct a public-key encryption scheme which is CPA secure but not circularly secure, relying only on the existence of public-key encryption schemes. This is a problem from my cryptography course ...
minukesis's user avatar
4 votes
1 answer
508 views

I have been using lifted ElGamal for my binary choice encryption into an exponent $g^m$, where m=0 or m=1. After ciphertext aggregation and decryption I got a message as $g^{m1+m2+m3+...+mn}$ and I ...
ojacomarket's user avatar
1 vote
1 answer
123 views

This question is purely to satisfy my curiosity - I'm not attempting to implement my own encryption, I'm just curious. Let's say Alice and Bob establish a communication channel, and the first thing ...
user avatar
2 votes
1 answer
148 views

I want to know what is the complexity of the lattice-reduction algorithm (used agains CKKS encryption algorithm) named Block Korkine-Zolotarev (BKZ) algorithm (Curtis et al., 2019)? ref: https://...
John's user avatar
  • 31
1 vote
0 answers
78 views

I am engaged in the translation of encrypted files. I have several files encrypted in the same way. The files consist of two parts: 48 byte header example - ...
Alba's user avatar
  • 11
0 votes
2 answers
216 views

Is there any respected mathematician who can correctly transform the double SHA proof-of-work (used in Bitcoin mining) into a satisfiability (SAT) problem, ensuring that the CNF conversion is done ...
user avatar
3 votes
2 answers
355 views

I'm working in an insurance company. Beyond meeting regulatory compliance requirements, is there really any need to enforce hsm in Azure Key Vault (premium tier). The risk of exposure seems ...
Seau's user avatar
  • 31
1 vote
1 answer
89 views

I know that Sieve Algorithms are good attacks against CKKS Encryption Techniques. I want to know the exact expression of the complexity of the Sieve Algorithm attacks, according to Miklós Ajtai, Ravi ...
John's user avatar
  • 31

15 30 50 per page
1
2 3 4 5
327