• Breaking News

    Wednesday, October 3, 2018

    Cryptography Single DES for Maccing

    Cryptography Single DES for Maccing


    Single DES for Maccing

    Posted: 03 Oct 2018 12:59 AM PDT

    Hey all - I have a theoretical question with regards Single DES and how quickly it can be broken when used in Maccing. So I am aware of a system which uses Single DES to MAC a transaction, but uses a bespoke key for each transaction (protected by a SDES Zone Key)

    The Zone Keys are rotated regularly, (every month).

    My question is that most attacks on DES require lots of data and brute force, and the user in this case is claiming that with the nature of Maccing there isn't enough data to crack these Message Keys.

    Any thoughts?

    submitted by /u/AndMcGrn
    [link] [comments]

    Why is modular exponentiation, and not modular multiplication, used in RSA?

    Posted: 02 Oct 2018 08:52 AM PDT

    What is the purpose of this? Is it essential to use exponentiation and not multiplication? And if there were to be a multiplication rather than exponentiation based scheme, would it's core principles that make it tick be any different (or would it simply be a lot harder to crack)?

    submitted by /u/massivebrain
    [link] [comments]

    BlueDye Stream Cipher

    Posted: 02 Oct 2018 08:45 PM PDT

    I want to first thank those that helped in the cryptanalysis of the hand cipher RedDye. Over the past few days, I've furiously coded up and tested what is kind of RedDye Refit and upgrade, BlueDye. The construction uses 256 byte array of 0-255 elements like RC4 and does one swap per round.

    https://github.com/pvial00/BlueDye

    The question is, since this cipher resolves the known plaintext attack issue in RedDye. Could this cipher be susceptible to the bias in RC4 and follow-up ciphers? Could it be susceptible to Roo's bias and how would one test for this?

    submitted by /u/pvial00
    [link] [comments]

    Request Fore Resourses/Material about cryptography

    Posted: 02 Oct 2018 01:05 PM PDT

    Hello,

    I am taking a course in Cryptography where we define a cryptographic scheme and we are trying to prove its security using game based techniques and reduction. However, I am not able to understand the lectures from our instructor.

    Could you please recommend some online resources or books that tackles topics such as Provable security, PRF, Identity-Based Encryption, and Hierarchical Identity-Based Encryption ?

    Thank you in advance

    submitted by /u/CHoudrouge4
    [link] [comments]

    OpenSSL # 1 - Generate Private and Public Keys

    Posted: 02 Oct 2018 01:02 PM PDT

    No comments:

    Post a Comment