Cryptography A collection of some cryptographic primitives in python (for educational purposes only) |
- A collection of some cryptographic primitives in python (for educational purposes only)
- I need help decoding a message my stalker keeps sending me
- Client puzzle protocol with manual verification
- Hash function using asymmetric fully homomorphic encryption
A collection of some cryptographic primitives in python (for educational purposes only) Posted: 12 Aug 2018 03:24 PM PDT |
I need help decoding a message my stalker keeps sending me Posted: 12 Aug 2018 08:42 PM PDT Okay, so I joined this discord ( https://discord.gg/vQybUyc if you want to see the guy on it) and a guy by the name of stEPi4eKbnkFHvzUOuAiyA28EcEYtzjn joined after me. I had just created a discord account specifically to join the aforementioned server, as one of my friends were on it. Then that weird guy joined. My name on discord is Anabel, which isn't my real name. The random guy was able to give me my real name as well as things that only someone who has been following me would know, like where I am, what I am eating, and so on. Now, for the stuff I came here for. One, I was hoping someone could give insight on the guys name, stEPi4eKbnkFHvzUOuAiyA28EcEYtzjn. But two, he has been telling me to decode a message, this; oVKEV4WtoMLyNhJ0BVbvbuRzRNpyOGSejKx5joJsVbF9A4yL8EfHc8yzWk4uBMJp3KgINMvIr2gl925fmiFhdjcrOKLzsbOaxX9vAVy9RP2/Mlj1jxqVf8gl6hMQjlo0jyDtnBk81BzRr7XKnX1FZo/LRA569H0/OdlvsIsdZitYTrEX0XSSiuAqdR0n8aIPVrVEA2dSw7Z0EzBklf/s5G3dO99XsVPAvvFaw6s6Dh62OPG+oMM3cWwB5ladeU3L3UbH/zSZ6EuAiXF1f/yI4QJCMeEAFIVd3UulFa6/DqCV6Q/T+H9bgANQHv/cSB0IhTF9oWwaKqcTEB1EB8fsV/Jrp+j1TVWf Blowfish CBC Any help would be appreciated. Thank you... [link] [comments] |
Client puzzle protocol with manual verification Posted: 12 Aug 2018 08:34 PM PDT Hi Suppose a client puzzle protocol needs the verification done by another human on the user's device, is there a way for the verification to be done securely? Suppose also the judge does not have other access to the server. For instance, suppose the user receives a challenge from the server, completes the challenge and a 'judge' comes over and verifies it on the same device. Is there a way for the judge to securely verify the result on the device? Of course, the judge could enter a private password first, but the user could peek over the shoulder or log keystrokes. [link] [comments] |
Hash function using asymmetric fully homomorphic encryption Posted: 12 Aug 2018 10:47 AM PDT Hi all! I want to compute a hash function digest using Fully homomorphic encryption from an encrypted input (say 128 bits, ideally closer to 256 bits) to an output of ideally 256 bits. First, does anyone knows any theoretical or practical implementation of this? If not, I have seen that sha2 256 requires about 30000 logic gates. I think homomorphic encryption is still limited to a few 100s logic gates or am I mistaken? Any other opinion is welcome too. Thanks for your time! [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment