Cryptography Crypto is not cryptocurrency |
- Crypto is not cryptocurrency
- ELI5 - How do RSA, DSA, and ECDSA differ?
- generating "pseudonyms" for a set of public keys?
- How to try to predict the output of Micali-Schnorr Generator (MS-DRBG) knowing the factorization. Part II
- Advice - need recommendations on some books that covers polyalphabetic and monoalphabetic cryptology
Posted: 14 Dec 2017 04:38 AM PST |
ELI5 - How do RSA, DSA, and ECDSA differ? Posted: 14 Dec 2017 07:04 AM PST Maybe ELI-fifteen. I understand RSA is an asymmetric encryption algorithm that is used to generate a set of keys such that what is encrypted with one key can only be encrypted with the other (and vice versa). I know DSA and ECDSA are also asymmetric algorithms, but I do not understand how they differ from vanilla RSA. What are DSA and ECDSA? How are they different from each other (beyond one simply using elliptic curves)? How are they different from RSA? What are the strengths of each compared to the other? [link] [comments] |
generating "pseudonyms" for a set of public keys? Posted: 14 Dec 2017 01:48 PM PST Does anyone have thoughts on achieving the following cryptographic scheme? We have a set of public keys {PublicKey_0, PublicKey_1, ... PublicKey_n}. These come from individual users registering the PublicKey part of their Public/PrivateKey pair. We want to be able to generate "pseudonym" public keys, such that for each PublicKey_i, there is some PseudonymPublicKey_j controlled by the owner of PrivateKey_i, but the connection between PublicKey_i and PseudonymPublicKey_j is obfuscated. To me this looks a lot like a confidential transactions problem. We want to credit each public key holder with an "identity-token", and then allow them to confidentially transact the ownership of that token to a new address / public-key. So for example, perhaps Monero/RingCT could be adapted to transact atomic tokens. Controlling a PseudonymPublicKey would then be similar to proving ones Monero balance using a ViewKey? I looked into the math behind MimbleWimble confidential transactions (spelt out beautifully here *), but this approach has no public addresses, so I don't see it working. Maybe the analogy with confidential transactions is misleading and I should look into other approaches? [link] [comments] |
Posted: 14 Dec 2017 03:32 AM PST |
Advice - need recommendations on some books that covers polyalphabetic and monoalphabetic cryptology Posted: 14 Dec 2017 04:40 AM PST I have a school project about the Enigma, and i need a book that covers polyalphabetic and monoalphabetic cryptology (not a website). I know a lot of books covers this, but just want to know if anybody knows a book that explains it very well. [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment