Most Popular
1500 questions
11
votes
3 answers
AES key reuse and guessing the key
Bit of a noob question and a fair bit of Googling didn't help. I understand that the current encryption standard is AES256. A few questions
Is the point of this (and other encryption techniques) to reuse the same private key for multiple messages?…
user1936752
- 778
- 1
- 4
- 17
11
votes
1 answer
What is Deterministic Authenticated Encryption?
I came across something known as deterministic authenticated encryption in my studies, and a lot of people were associating it with Synthetic IV mode.
I am having trouble understanding what exactly DAE is because I thought that if something was…
winsticknova
- 269
- 2
- 6
11
votes
3 answers
The internals of bcrypt
I'm attempting to get a better understanding of cryptography and have run into some questions about bcrypt.
Bcrypt relies on the blowfish cipher, which is a reversible method of encryption. But bcrypt is not reversible. How is that possible? Or am…
temporary_user_name
- 247
- 1
- 8
11
votes
2 answers
How many possible Enigma machine settings?
I'm trying to calculate the amount of settings the enigma machine has. I have found several sites regarding this topic, but it seems like there are two answers to my question. The first answer is 158,962,555,217,826,360,000 and the second is…
Mephistopheles
- 213
- 1
- 2
- 5
11
votes
2 answers
How does hash speed vary based on string length?
Surprisingly I have not been able to find an answer to this question on Google.
If I have a function that is based on any of the popular hashing algorithms used for password generation, by what percentage/magnitude does the speed change when the…
NibblyPig
- 213
- 2
- 6
11
votes
4 answers
Why was the Navajo code not broken by the Japanese in WWII?
In reading about this topic recently, to my understanding, the encryption schemes used on top of the Navajo language were very simple and definitely could have been broken (my research shows they mapped Navajo words to various different…
Michael Goldstein
- 213
- 2
- 7
11
votes
1 answer
Performance of ECDSA, ECKCDSA and ECGDSA
It is proven that ECDSA algorithms are faster in key and signature generation compared to RSA. In addition, the signatures are much shorter.
However, I would like to know the performance difference of the variants ECKCDSA and ECGDSA compared to…
budderick
- 435
- 3
- 11
11
votes
2 answers
Need for salt with IV
I have mainly referred to this question. Definitely in case of using a salt, IV has a use of adding randomisation to each and every key. But isn't it redundant in case of using an IV to use a salt? (Like in case of referring to PBE with AES in CBC…
Kaustubh
- 195
- 1
- 8
11
votes
4 answers
What is the advantage of digital signatures over message authentication codes?
Studying for CISSP these choices seemed limited:
What is the advantage of digital signatures over message authentication codes?
Digital Signature provides integrity verification while message authentication code does not
Digital Signature provides…
dannys1s1
- 119
- 1
- 4
11
votes
1 answer
Could this "symmetric RSA" scheme provide key compromise resistant communications?
This question, and fkraiem's answer to it, made me wonder about the security and practicality of using "symmetric RSA" to provide a partially compromise-resistant secure channel.
Specifically, assume that Alice and Bob wish to communicate securely…
Ilmari Karonen
- 46,700
- 5
- 112
- 189
11
votes
1 answer
When/why is RSA (hybrid) encryption used rather than alternatives?
I've read that RSA is not meant for encrypting large plaintext because:
(Are these also true for other public-key encryptions like ElGamal?)
It is slow.
Padding makes the ciphertext blocks much longer.
No one uses RSA that way; so its security is…
Myath
- 902
- 7
- 20
11
votes
1 answer
HD (Hierarchical Deterministic) Keys using Safe Curves?
Bitcoin's HD (Hierarchical Deterministic) Keys as described in BIP32 allow for a master key to be created (a private key and a chain code) such that a tree of both public and private keys can be derived from a master key, each which can have…
Christopher Allen
- 221
- 1
- 3
11
votes
1 answer
How to tell if a hardware RNG is rigged?
On a related note of building my own RNG, as someone suggested to use several commericial solutions how can I check if it is rigged against me? (although I am still strongly biased to a homebrew solution that is designed to be hard to subvert,…
Maxthon Chan
- 558
- 3
- 12
11
votes
1 answer
Structure for an introductory course on cryptography?
Many introductory courses on cryptography have their treatment of secret-key crypto start with OTP, then block ciphers, and for public-key cryptography revolve around RSA with no notion of padding (some even have matching exercises showcasing…
fgrieu
- 149,326
- 13
- 324
- 622
11
votes
1 answer
Are there comprehensive alternatives to RSA?
If we wished to, is there a comprehensive alternative to RSA?
I say comprehensive as I wonder if there is one which does both encryption and digital signature like RSA?
If not, simply what alternatives are there?
Ali
- 481
- 2
- 6
- 12