Questions tagged [integrity]

In a cryptographic sense, integrity means unimpaired and complete.

In a cryptographic sense, integrity means unimpaired and complete. To give a practical example: a compromised cryptographic algorithm has lost part (or all) of it's integrity, making it "less safe" to use.

148 questions
6
votes
4 answers

Which tamper-protection algorithm provides the shortest output?

Background When making web applications you sometimes need to pass data along with the form which isn't visible to the user. Database IDs are the most common, but texts and IDs are sometimes necessary too. For this reason there is a field…
Vilx-
  • 1,095
  • 1
  • 8
  • 11
5
votes
1 answer

Difference between INT-CTXT and INT-PTXT

I have read recently (here) about INT-CTXT and INT-PTXT and that INT-CTXT is strictly stronger than INT-PTXT. I wonder if there is any clear example of the situation when INT-PTXT is achieved but no INT-CTXT? There are also examples of related…
Enr1g
  • 198
  • 2
  • 9
2
votes
2 answers

How to ensure that a "received value" is not altered?

I have a program (whereby people can download and run on their own computers) that will calculate a couple of unknown values each day. For simplicity sake, let's assume that the calculation is simply Rand(0, 1). The program will run and the user…
Pacerier
  • 1,255
  • 2
  • 10
  • 16
1
vote
0 answers

Provable Data Possession

While Provable Data Possession seems to be a very useful and interesting tool for ensuring integrity of data outsourced into Cloud providers, I have never seen a reputed Cloud provider talk about this in their products. Is this tech purely academic…
0
votes
1 answer

Best method for checking integrity of 50 GiB files?

I'm making backups of compressed data (using ZPAQ), some compressed archives are large (50 GiB) I was just going to use sha3sum -a 512, for example: sha3sum -a 512 "Total_DOS_Collection-RELEASE#17-[1981-1995].zpaq" Then storing the value and later…
0
votes
2 answers

How a sender will ensure that the public key used for encryption is the key of intended reciver?

Say Alice is the sender and Bob is the receiver. Alice has the public key of Bob and wants to send some data to Bob. How Alice will ensure that the public key she is having is really belongs to Bob?
Gokul
  • 1
  • 1
0
votes
3 answers

Can DH shared secret provide integrity?

Assume that A and B have exchanged their public keys beforehand. Now, A and B wants to communicate over an insecure channel and want to provide integrity and confidentiality on the message. A use the shared secret calculated using DH to encrypt the…
Michael Tsang