Questions tagged [encryption]

a transformation of information to make it unreadable to outside observers

Encryption is a mathematical transformation of data (the plaintext) into a ciphertext which is unreadable to principals who do not possess the proper key. Use this tag in addition to if your question is specifically about encryption or decryption.

73 questions
2
votes
1 answer

RSA Encryption & Anonymity

Considering plain RSA encryption, assume we have B who wants to send 10 messages to either A1 or A2. The recipients' public key, namely the exponent e1, e2 and prime product n1, n2 for A1/A2 respectively, is publicly known. When B sends out, he will…
Marcel
  • 23
  • 3
1
vote
1 answer

Why do we use RSA if it is not secure against chosen ciphertext attack?

I am reading RSA cryptosystem from Farouzan book on network security. The author has mentioned that RSA encryption is prone to chosen ciphertext attack. Then why is this algorithm still so popular?
Kishan Kumar
  • 705
  • 1
  • 8
  • 23
1
vote
1 answer

Asynchronous Encryption with wordlists

As I understand it encrypted emails have a high profile (detectable through pgp header / attachment). Would it be possible to match the encrypted data with a wordlist to hide the fact that the email contains a encrypted message? I know that the…
Xenira
  • 13
  • 3
0
votes
2 answers

How can a fully encrypted homomorphic program resist copying?

Let's say that we have an original homomorphically encrypted program with any possible code inside. What methods can it use to ensure that it is impossible to create an exact copy of it? Are there such ways? I understand that a person without a key…
Malta
  • 9
  • 1
0
votes
0 answers

Are there cs methods to uniquely create an ID, that prevent masquerading

I'm not sure if this is the right place, but I have an idea for a database kind of like a wiki, that would NOT have editors, and would have the following requirements: Any user can start with using their real name or a pseudonym Anyone can later…
Adam Jones
  • 101
  • 1
0
votes
0 answers

Is my interpretation of the SSL process correct?

Firstly, which of the two diagrams below is the more accurate or more well-explained (if both are accurate) representation of the SSL process (at a beginner's level)? Diagram 1 Diagram 2 Also where does the "pre-master secret" in diagram 1, step 5…
tsp216
  • 101
  • 3
0
votes
1 answer

Confusion on RSA attack equation

I am reading this paper on RSA attacks and it describes the equation where ed = 1 mod φ(N) This confuses me because wouldn’t 1 mod of anything (not 1) just always be equal to 1?
Lydia
  • 1
0
votes
0 answers

What is the encryption method that works without exchanging any public or private keys at all?

We are learning about encryption (e.g. RSA) in class at the moment and our teacher told us about a paper he had read (and didn't remember the name) which presented an interesting encryption method. The premise was that the method didn't require the…
Ladan
  • 1
0
votes
1 answer

Asymmetric encryption puzzle

I came across this riddle link question: Your name's Graham. Bob wanted to send Alice a secret msg m. However, he was concerned about the security. He encrypted his message with a keyword that both of them knew. Several weeks before this, you…
x89
  • 167
  • 1
  • 9
0
votes
0 answers

Can reducing NP problems to subset NP Problems leed to faster calculation of NP problems

Integers can be represented with a pair of smaller numbers. To achieve this I use 2 integer sequences. Integer Sequence 1 1,1,2,1,2,3,1,2,3,4... And Integer Sequence 2 1,2,1,3,2,1,4,3,2,1... This gives me a unique pair of smaller integers for every…