Skip to main content
poncho's user avatar
poncho's user avatar
poncho's user avatar
poncho
Moderator
  • Member for 14 years, 6 months
  • Last seen this week
comment
Do KEMs protect against malicious public (encapsulating) keys?
"It is widely known that elliptic curve Diffie-Hellman is vulnerable to maliciously crafted public keys, where a honestly generated private key combined with a malicious public key may result in predictable output." Actually, there are well known ways to protect against that. For prime order curves (e.g. P256), all you need to do is verify that the public key is a point on the curve (and not the point at infinity).
revised
Loading…
revised
Loading…
revised
Loading…
Loading…
comment
Do KEMs protect against malicious public (encapsulating) keys?
I do not believe that Fujisaki-Okamoto protects against malicious public keys. What it protects against are malicious ciphertexts. The FO transform is run by the decapsulator (Bob in your example); this attack is against Alice, who does not perform it.
comment
Impact of Known Arithmetic Progressions on Semiprime Factorization via Differences of Squares
It appears that $N$ is defined two different ways, $N = pq$ and $N = p^2 - q^2$. What you mean is clear - it might be better if you didn't give those two different values the same name.
comment
Best way to transfer partially known data using AES-CBC
@PaŭloEbermann: the XOR sum not repeating is critical, but that can be done by keeping on a constant, and the other an incrementing sum - no unpredictability required
comment
Best way to transfer partially known data using AES-CBC
If you don't want to send the IV, one trick you could do with CBC is just prepend 16 bytes of anything to the plaintext and encrypt it with an arbitrary IV. Then, the decryptor picks an IV (unlikely to be the one the encryptor used), and decrypt that, and then strip off the first 16 bytes. Then, by magic, that's the original plaintext (!).
Loading…
comment
Applications of a congruence relation $a^{r+s} \equiv a^r \pmod{m}$
There's the observation that if you know the value of $s$ for a fixed $a$, then (unless $a$ has a tiny order, which is improbable if $a$ is selected randomly), you can factor $m$. This is how Shor's algorithm (which is a Quantum algorithm which recovers $s$) is used to factor.
comment
Simultaneous access to both encryption and decryption oracles for a symmetric encryption algorithm
These are the assumptions for a standard CCA attack. We generally assert that if a symmetric system isn't strong against such an attack, it's not considered secure.
Loading…
Loading…
Loading…
Loading…
revised
Loading…
revised
Carmichael number factoring
deleted 160 characters in body
Loading…
comment
Carmichael number factoring
@JasonS: that you for the correction - I fixed the text
comment
Is the large parameter k computationally significant in linear parametrizations of semiprimes with small fixed displacements?
In a standard factorization problem, the adversary can compute a set of size $\phi(m)$ of possible $(a, b)$ pairs. Hence, if $m$ is relatively small, any such algorithm cannot give a significant advantage - if it did, then the general factorization problem becomes easier
1
2 3 4 5
571