Most Popular
1500 questions
11
votes
1 answer
HD (Hierarchical Deterministic) Keys using Safe Curves?
Bitcoin's HD (Hierarchical Deterministic) Keys as described in BIP32 allow for a master key to be created (a private key and a chain code) such that a tree of both public and private keys can be derived from a master key, each which can have…

Christopher Allen
- 221
- 1
- 3
11
votes
0 answers
Why SIVP Is Worst Case Problem?
I just started to study lattice Cryptography.
I'm now studying worst-case to average-case reduction for SIS.
In previous question, "worst means any and average means random".
And I wonder why the Shortest Independent Vectors Problem(SIVP) is the…

Jonghyun Kim
- 477
- 2
- 8
11
votes
1 answer
How to tell if a hardware RNG is rigged?
On a related note of building my own RNG, as someone suggested to use several commericial solutions how can I check if it is rigged against me? (although I am still strongly biased to a homebrew solution that is designed to be hard to subvert,…

Maxthon Chan
- 558
- 3
- 12
11
votes
1 answer
Structure for an introductory course on cryptography?
Many introductory courses on cryptography have their treatment of secret-key crypto start with OTP, then block ciphers, and for public-key cryptography revolve around RSA with no notion of padding (some even have matching exercises showcasing…

fgrieu
- 140,762
- 12
- 307
- 587
11
votes
1 answer
Are there comprehensive alternatives to RSA?
If we wished to, is there a comprehensive alternative to RSA?
I say comprehensive as I wonder if there is one which does both encryption and digital signature like RSA?
If not, simply what alternatives are there?

Ali
- 481
- 2
- 6
- 11
11
votes
4 answers
RSA & DH at risk due to math advances, will this eventually affect elliptic curves too?
I was looking into the predictions by some researchers that RSA and Diffie-Hellman may not be secure in the next few years due to advances in math and being able to calculate the discrete logarithm problem in new ways no longer making them…

Jesse
- 415
- 1
- 5
- 16
11
votes
1 answer
Why do stream ciphers use a nonce?
My question maybe will be stupid, but my problem is that I do not understand why stream ciphers need a key and also a nonce. As far as I understand, the keystream is generated with the nonce. The same key can be reused with a different…

robert
- 253
- 2
- 10
11
votes
5 answers
How does generating random numbers "remove entropy from your system"?
In a previous question, I quoted the --gen-random entry in the GPG Man Pages. At the end it says:
PLEASE, don’t use this command unless you know what you are doing; it may remove precious entropy from the system!
How does that work? I understand…

camercu
- 333
- 3
- 10
11
votes
0 answers
What level of security is provided when a Feistel Cipher is used as a round function of another Feistel Cipher?
Recently, I was reading: Are there any specific requirements for the function F in a Feistel cipher?, and the answer posted mentions a Feistel Cipher named Turtle, which uses a four-round Feistel scheme as a round function for a four-round Feistel…
user17887
11
votes
2 answers
Whats the point of an IV if public?
What is the point of the initialization vector in cryptographic modes like AES-CBC when it is sent in the public?
Cant any attacker just listen and reverse the IV? and as such defeating its purpose?
EDIT
I already know what has been said here. My…

user27551
- 111
- 1
- 3
11
votes
1 answer
Encryption algorithm used in WPA/WPA2
I want to know how EXACTLY the WPA password gets encrypted
I have been searching through and I was able to catch:
The actual password is converted to some hash
Salting is applied to the hash
The operation is not reversible
The hash comes with the…

OverCoder
- 273
- 1
- 2
- 7
11
votes
3 answers
What is the state of cryptographic obfuscation in 2015?
Cryptographic Obfuscation is a technique that allows one to obfuscate source code in a secure way (as opposed to insecurely mangling it into spaghetti code.) For example, here is a way to protect a piece of data with a password:
cipher_text =…

Christopher King
- 819
- 5
- 19
11
votes
2 answers
K out of N encryption
A friend just showed me how to combine padlocks to achieve a lock that opens when k out of n people turn their keys.
I was wondering if there was something similar for encryption; using n or fewer public keys encrypt a piece of data so it can only…

Thomas Ahle
- 211
- 1
- 5
11
votes
3 answers
Is full Homomorphic encryption quantum resistant?
Since most of our asymmetric encryption algorithms are going to be out-of-date in a couple of year due to Shor's algorithm, I was wondering about the future of FHE schemes.
I have found this paper, which states:
"It is impossible to construct…

asdf
- 324
- 3
- 10
11
votes
6 answers
Is there any open-source white-box implementation of AES or DES?
I googled it, but got no result. There is a binary executable of a white-box implementation of DES (scroll down), but no source code is provided.
The same page also links various papers about white-box cryptography, but these don't contain the…

ir01
- 3,992
- 3
- 21
- 31