Most Popular

1500 questions
11
votes
3 answers

AES key reuse and guessing the key

Bit of a noob question and a fair bit of Googling didn't help. I understand that the current encryption standard is AES256. A few questions Is the point of this (and other encryption techniques) to reuse the same private key for multiple messages?…
user1936752
  • 778
  • 1
  • 4
  • 17
11
votes
1 answer

What is Deterministic Authenticated Encryption?

I came across something known as deterministic authenticated encryption in my studies, and a lot of people were associating it with Synthetic IV mode. I am having trouble understanding what exactly DAE is because I thought that if something was…
11
votes
3 answers

The internals of bcrypt

I'm attempting to get a better understanding of cryptography and have run into some questions about bcrypt. Bcrypt relies on the blowfish cipher, which is a reversible method of encryption. But bcrypt is not reversible. How is that possible? Or am…
11
votes
2 answers

How many possible Enigma machine settings?

I'm trying to calculate the amount of settings the enigma machine has. I have found several sites regarding this topic, but it seems like there are two answers to my question. The first answer is 158,962,555,217,826,360,000 and the second is…
Mephistopheles
  • 213
  • 1
  • 2
  • 5
11
votes
2 answers

How does hash speed vary based on string length?

Surprisingly I have not been able to find an answer to this question on Google. If I have a function that is based on any of the popular hashing algorithms used for password generation, by what percentage/magnitude does the speed change when the…
NibblyPig
  • 213
  • 2
  • 6
11
votes
4 answers

Why was the Navajo code not broken by the Japanese in WWII?

In reading about this topic recently, to my understanding, the encryption schemes used on top of the Navajo language were very simple and definitely could have been broken (my research shows they mapped Navajo words to various different…
11
votes
1 answer

Performance of ECDSA, ECKCDSA and ECGDSA

It is proven that ECDSA algorithms are faster in key and signature generation compared to RSA. In addition, the signatures are much shorter. However, I would like to know the performance difference of the variants ECKCDSA and ECGDSA compared to…
budderick
  • 435
  • 3
  • 11
11
votes
2 answers

Need for salt with IV

I have mainly referred to this question. Definitely in case of using a salt, IV has a use of adding randomisation to each and every key. But isn't it redundant in case of using an IV to use a salt? (Like in case of referring to PBE with AES in CBC…
11
votes
4 answers

What is the advantage of digital signatures over message authentication codes?

Studying for CISSP these choices seemed limited: What is the advantage of digital signatures over message authentication codes? Digital Signature provides integrity verification while message authentication code does not Digital Signature provides…
dannys1s1
  • 119
  • 1
  • 4
11
votes
1 answer

Could this "symmetric RSA" scheme provide key compromise resistant communications?

This question, and fkraiem's answer to it, made me wonder about the security and practicality of using "symmetric RSA" to provide a partially compromise-resistant secure channel. Specifically, assume that Alice and Bob wish to communicate securely…
Ilmari Karonen
  • 46,700
  • 5
  • 112
  • 189
11
votes
1 answer

When/why is RSA (hybrid) encryption used rather than alternatives?

I've read that RSA is not meant for encrypting large plaintext because: (Are these also true for other public-key encryptions like ElGamal?) It is slow. Padding makes the ciphertext blocks much longer. No one uses RSA that way; so its security is…
Myath
  • 902
  • 7
  • 20
11
votes
1 answer

HD (Hierarchical Deterministic) Keys using Safe Curves?

Bitcoin's HD (Hierarchical Deterministic) Keys as described in BIP32 allow for a master key to be created (a private key and a chain code) such that a tree of both public and private keys can be derived from a master key, each which can have…
11
votes
1 answer

How to tell if a hardware RNG is rigged?

On a related note of building my own RNG, as someone suggested to use several commericial solutions how can I check if it is rigged against me? (although I am still strongly biased to a homebrew solution that is designed to be hard to subvert,…
11
votes
1 answer

Structure for an introductory course on cryptography?

Many introductory courses on cryptography have their treatment of secret-key crypto start with OTP, then block ciphers, and for public-key cryptography revolve around RSA with no notion of padding (some even have matching exercises showcasing…
fgrieu
  • 149,326
  • 13
  • 324
  • 622
11
votes
1 answer

Are there comprehensive alternatives to RSA?

If we wished to, is there a comprehensive alternative to RSA? I say comprehensive as I wonder if there is one which does both encryption and digital signature like RSA? If not, simply what alternatives are there?
Ali
  • 481
  • 2
  • 6
  • 12
1 2 3
99
100