Skip to main content

Questions tagged [standards]

Questions about official cryptographic standards and their implementation.

2 votes
2 answers
151 views

In TLS, mlkem768x25519 derives a master shared secret from a concatenation of the x25519 shared secret and the ML-KEM shared secret. The FIPS-approved hybrid PQC key agreement algorithm, ...
forest's user avatar
  • 16.2k
1 vote
2 answers
360 views

Introduction In 2005, Daniel J. Bernstein proposed a simple polynomial over $2^{130} - 5$ for fast universal hashing with applications to authenticated encryption [1]. Over the years, Poly1305 gained ...
luiz's user avatar
  • 95
6 votes
1 answer
162 views

RFC 9242 - Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2) describes a new IKEv2 exchange type called "IKE_INTERMEDIATE". The purpose of this type is to allow ...
hakoja's user avatar
  • 2,807
0 votes
0 answers
28 views

Per this blog post and this press release, stateless hash-based digital signature schemes seem to not be approved by CNSA 2.0 for software signing. What's the rationale for this? This strikes me as ...
Melab's user avatar
  • 4,338
4 votes
2 answers
1k views

Is there still an active cryptographic standard in some developing country that admits the use of the multiplicative group of a sufficiently large finite field $\mathbb{F}_{\!q}$ (usually, $q$ is ...
Dimitri Koshelev's user avatar
0 votes
1 answer
167 views

I’ve been reviewing the NIST Multi-Party Threshold Cryptography project, and I noticed that several primitives are being standardized, including RSA encryption and decryption. However, I don't see the ...
Leonardo Kimura's user avatar
1 vote
0 answers
118 views

In lines 8 to 10, why it does not get input bytes as it is (i.e., line 8)? It first does some changes (line 9 and 10). Do authors do this changes as we cannot work with binary form of a variable ...
user1035648's user avatar
4 votes
0 answers
95 views

DSA/ECDSA has not been shown to be provably secure when H alone is modeled as an RO (Random Oracle). However, Brickell showed as far back as 1996 ([2], I couldn't actually find his Brickell96 citation)...
Franklin Harding's user avatar
2 votes
1 answer
115 views

Let me ask one question. Maybe, you know an answer. Thanks in advance for any response. Let's fix an elliptic curve $E$ over the field $\mathbb{Q}$ of rationals without complex multiplication, i.e., ...
Dimitri Koshelev's user avatar
0 votes
0 answers
66 views

According to answer and status of PGP on RFC search, OpenPGP RFCs can be used as "technical reference for the applicable internet standard". The quote mentioned in previous sentence is a ...
aackmann's user avatar
2 votes
1 answer
1k views

Sorry for asking another question but is BN254 specification standardized? I am using two different implementations one python another solidity and the prime field $F_p,F_{p^2}$ and the the group ...
Manish Adhikari's user avatar
3 votes
1 answer
852 views

Is my summary understanding of current (classical) Digital signature standards essentially correct? I may be totally wrong. DSA is no longer to be used for new signature generation just for checking ...
kodlu's user avatar
  • 25.9k
1 vote
0 answers
50 views

PKCS#12 contains 2 integrity protection modes: password-based and public-key based. The way this is done in the standard is that data layout wise it appears to be fine to skip integrity protection ...
Vlad's user avatar
  • 211
0 votes
1 answer
3k views

While setting up PGP for the first time, I am presented with various encryption standards I can use being: RSA (2048, 3072, 4096 bits) with an option for + RSA (2048, 3072, 4096 bits) DSA (2048 bits) ...
Bill Joe's user avatar
4 votes
2 answers
228 views

I am trying to implement a stream cipher that uses an LFSR PRNG. I have found resources online that give good primitive polynomials, but I am struggling to find resources with the initial states as ...
Lachlan's user avatar
  • 111

15 30 50 per page
1
2 3 4 5
10