• Breaking News

    Friday, December 15, 2017

    Cryptography Crypto is not cryptocurrency

    Cryptography Crypto is not cryptocurrency


    Crypto is not cryptocurrency

    Posted: 14 Dec 2017 04:38 AM PST

    ELI5 - How do RSA, DSA, and ECDSA differ?

    Posted: 14 Dec 2017 07:04 AM PST

    Maybe ELI-fifteen.

    I understand RSA is an asymmetric encryption algorithm that is used to generate a set of keys such that what is encrypted with one key can only be encrypted with the other (and vice versa).

    I know DSA and ECDSA are also asymmetric algorithms, but I do not understand how they differ from vanilla RSA.

    What are DSA and ECDSA? How are they different from each other (beyond one simply using elliptic curves)? How are they different from RSA? What are the strengths of each compared to the other?

    submitted by /u/erh_
    [link] [comments]

    generating "pseudonyms" for a set of public keys?

    Posted: 14 Dec 2017 01:48 PM PST

    Does anyone have thoughts on achieving the following cryptographic scheme?

    We have a set of public keys {PublicKey_0, PublicKey_1, ... PublicKey_n}. These come from individual users registering the PublicKey part of their Public/PrivateKey pair.

    We want to be able to generate "pseudonym" public keys, such that for each PublicKey_i, there is some PseudonymPublicKey_j controlled by the owner of PrivateKey_i, but the connection between PublicKey_i and PseudonymPublicKey_j is obfuscated.

    To me this looks a lot like a confidential transactions problem. We want to credit each public key holder with an "identity-token", and then allow them to confidentially transact the ownership of that token to a new address / public-key.

    So for example, perhaps Monero/RingCT could be adapted to transact atomic tokens. Controlling a PseudonymPublicKey would then be similar to proving ones Monero balance using a ViewKey?

    I looked into the math behind MimbleWimble confidential transactions (spelt out beautifully here *), but this approach has no public addresses, so I don't see it working.

    Maybe the analogy with confidential transactions is misleading and I should look into other approaches?

    submitted by /u/20171130
    [link] [comments]

    How to try to predict the output of Micali-Schnorr Generator (MS-DRBG) knowing the factorization. Part II

    Posted: 14 Dec 2017 03:32 AM PST

    Advice - need recommendations on some books that covers polyalphabetic and monoalphabetic cryptology

    Posted: 14 Dec 2017 04:40 AM PST

    I have a school project about the Enigma, and i need a book that covers polyalphabetic and monoalphabetic cryptology (not a website). I know a lot of books covers this, but just want to know if anybody knows a book that explains it very well.

    submitted by /u/MikkelMach
    [link] [comments]

    No comments:

    Post a Comment