Most Popular

1500 questions
11
votes
1 answer

Homomorphic (encrypted) comparison to an integer

When working with an additive homomorphic encryption scheme (say Pallier's), is there an efficient way to get the encrypted value of a comparison test to an integer value (I realise that an unencrypted comparison test would make the encryption…
Dave
  • 385
  • 2
  • 11
11
votes
1 answer

Why are the initial states of hashes functions (like SHA-1) often non-zero?

There is already a question asking "Why initialize SHA1 with specific buffer?" and my question follows on from this: Why are the initial states of hash functions often non-zero? For most, I have been able to find a clear explanation of where the…
Cryptographeur
  • 4,317
  • 2
  • 27
  • 40
11
votes
2 answers

Definition of a CSPRNG

I am interested in what conditions are necessary and sufficient to define a cryptographically secure pseudo-random number generator (CSPRNG). Wikipedia lists two defining characteristics: It satisfies the next-bit test. It withstands 'state…
Dave White
  • 213
  • 1
  • 4
11
votes
1 answer

Why does only length prepending improve the security of CBC-MAC

I know that length prepending improves security of CBC-MAC. However, wouldn't inserting the length elsewhere (middle, end or any other part of message) be equally good? After all, even the length is processed by the underlying cipher block.
TheRookierLearner
  • 991
  • 1
  • 10
  • 15
11
votes
3 answers

PBKDF2WithHmacSHA512 Vs. PBKDF2WithHmacSHA1?

I'm working on a Java authentication subsystem that specs the storage of passwords in the DB as PBKDF2-generated hashes, and I'm now trying to decide whether I should use SHA1 or SHA512 as PFR. I'm under the impression that the consensus is that…
Jim
  • 111
  • 1
  • 1
  • 3
11
votes
1 answer

Can an RSA private key have several public keys?

Ok, so my cryptography lecturer in University posed this question at the end of the RSA key generation lecture as a brain teaser. I have been thinking about this and I think I have come up with a way ( I am aware it's not practical and very…
sukhvir
  • 245
  • 1
  • 2
  • 7
11
votes
1 answer

Proof that IND$-CPA implies IND-CPA?

I've read a few papers recently that used a notion of security called "indistinguishability from random bits/strings" under chosen plaintext attack, also called IND\$-CPA. See e.g.…
J.D.
  • 4,445
  • 16
  • 21
11
votes
1 answer

What does 'a reduction is tight' mean rigorously?

As far as I know, when someone says 'a reduction is tight', it means that given that there is an adversary $A$ with advantage $\epsilon$ and running time $t$ and another adversary $B$ utilizing $A$ to solve a problem $P$, the advantage and running…
Lee Seungwoo
  • 363
  • 1
  • 8
11
votes
1 answer

What are the drawbacks of "lightweight crypto"?

Last year I learned about another NIST competition. https://csrc.nist.gov/projects/lightweight-cryptography/finalists And I thought to myself: "why would I continue to use heavyweight cryptography in my desktop and server environments, if we have…
Timur Timak
  • 145
  • 7
11
votes
3 answers

Is there any way to (irrevocably) *transfer* a private key to another person?

Let's say that Alice is the administrator of a group. For each message generated by a group member, Alice uses an administrator's private key ($sk$) to sign it, indicating that this message has been checked by her. One day, Bob takes over from…
Z. Chen
  • 185
  • 1
  • 6
11
votes
3 answers

AES CTR with similar IVs and same key

Let's say there is a piece of software that uses AES CTR to encrypt different messages using the same key but with slightly different IVs. So for example, a 16 byte IV, the 2nd 8 bytes are always the same, but the 1st 8 bytes are random. How…
bwbrowning
  • 243
  • 4
  • 7
11
votes
3 answers

Is If/else vulnerable to timing side-channel attacks?

I have a branching in c++: if (x & 1) { x = function_1(x); } else { x = function_2(x); } If function_1 and function_2 are constant time and it takes the same time to compute them, is such branching still vulnerable for side-channel attacks?…
Tom
  • 1,221
  • 6
  • 16
10
votes
4 answers

Is there a public key encryption scheme with optimal key size?

Symmetric encryption schemes such as AES have known security levels equal to their key sizes (i.e. breaking an encryption with an $n$ bit key needs about $2^n$ work steps). Elliptic curve encryption gets halfway towards optimal: its security is…
Geoffrey Irving
  • 394
  • 1
  • 11
10
votes
1 answer

Why is the maximum record size in TLS 1.3 limited to $2^{14}$ bytes?

RFC 8446 limits the maximum data carried withing single TLSv1.3 message to $2^{14}$ bytes, specifically in section 5.1: The record layer fragments information blocks into TLSPlaintext records carrying data in chunks of 2^14 bytes or less. The…
Vlad
  • 111
  • 1
  • 3
10
votes
2 answers

Will our app be FIPS 140-2 compliant if we use our own AES algorithm implementation?

We are in the processing to understand if our software applications is FIPS 140-2 compliant or not. Currently in our application, we are using our own implementation of AES algorithm. AES is a FIPS 140-2 compliant algorithm. The question would be…
windfly2006
  • 245
  • 2
  • 8
1 2 3
99
100