Skip to main content

Questions tagged [nonce]

A "nonce" is an arbitrary number or string used only once within the context of a specific cryptographic scheme. Nonces are used e.g. in authentication protocols to prevent replay attacks, as well as in stream ciphers (including CTR mode) to avoid keystream reuse.

3 votes
0 answers
118 views

I'm looking at using AES-256-GCM to encrypt data at rest (in a database) with logged-in user id's (among possibly other things) as the authenticated data. I'd like the application to (eventually) ...
ManRow's user avatar
  • 373
1 vote
0 answers
101 views

This question stems up from my recent research work, I've tried different methods. Is it possible to accurately know or get the parity (even or odd) of k (nonce) using r, s and z? If yes, please ...
иυэł's user avatar
0 votes
0 answers
104 views

There are a lot of papers on how to recover a private key from a nonce leakage in an ecdsa signature given a signed message. The fewer bits are known the more signatures are required. If I don’t know ...
user2284570's user avatar
0 votes
1 answer
217 views

It’s well known that in ECDSA, if two signatures are created using the same private key and the same nonce k, the private key can be recovered due to the linear ...
user2284570's user avatar
1 vote
0 answers
119 views

There have been a few Q&As on this site regarding whether fixed (e.g., all-zero) nonces are safe with key rotation every encryption and some mention of protocols, like TLS, incorporating ...
samuel-lucas6's user avatar
1 vote
1 answer
365 views

We do know about the common case or vulnerability of the nonce reuse in two signatures of an address transaction which leads to calculation of $k$ and retrieval of the private key. Apart from that ...
иυэł's user avatar
0 votes
1 answer
220 views

I'm kind of confused about this issue of nonce reuse, don't mind me cuz I'm a newbie, ok first let me explain in details my case, I have a peculiar scenario of a nonce reuse different from the normal ...
иυэł's user avatar
0 votes
1 answer
323 views

I have a question regarding nonce (r) reuse in ECDSA signatures and the potential risk of private key leakage. Specifically, I'm looking into transactions using P2PKH addresses and whether reusing the ...
Peakyblindrs's user avatar
1 vote
3 answers
380 views

I'm creating a protocol for securely sharing files peer to peer. I will use RSA OAEP to perform a handshake between peers, then use AES GCM to share the files. I watched this video about how GCM works ...
Vexcess's user avatar
  • 11
1 vote
1 answer
289 views

I'm trying to understand exactly what nonce-misuse AES-GCM-SIV mode mitigates. Wikipedia says, "In the event a nonce is misused (i.e., used more than once), nothing is revealed except in the ...
hunter's user avatar
  • 4,061
1 vote
0 answers
72 views

What is the point of having dedicated tweakable block ciphers in lieu of XEX which does the same? Does this have something to do with why no one uses XEX with a simple counter? The tweak schedule is ...
Amanda Lars's user avatar
4 votes
2 answers
508 views

I'm looking for a way to encrypt nonces that include a timestamp, to prevent them from leaking information. The nonces are uniquely generated in 64/96/128 bits variants. I would like the encryption to ...
Juul's user avatar
  • 43
2 votes
1 answer
178 views

In every stream cipher (where applicable) that I know of the counter is always separate from the nonce. What is the reason for why the counter is not just part of the nonce and addition is modulo 64? ...
wakefulmemory's user avatar
2 votes
3 answers
836 views

AES-CTR and authenticated variants tend to have a 'problem' with lacking bit real-estate for nonce & counter. Why hasn't an AES-512 variant been standardized at some point? It would allow moving ...
Angelica's user avatar
1 vote
0 answers
46 views

In request/response communication, replay protection can be implemented by exchanging a random number. For example, in its secure request, a client sends a random UID (nonce) to the server in addition ...
SBond's user avatar
  • 143

15 30 50 per page
1
2 3 4 5
15