Cryptography Single DES for Maccing |
- Single DES for Maccing
- Why is modular exponentiation, and not modular multiplication, used in RSA?
- BlueDye Stream Cipher
- Request Fore Resourses/Material about cryptography
- OpenSSL # 1 - Generate Private and Public Keys
Posted: 03 Oct 2018 12:59 AM PDT Hey all - I have a theoretical question with regards Single DES and how quickly it can be broken when used in Maccing. So I am aware of a system which uses Single DES to MAC a transaction, but uses a bespoke key for each transaction (protected by a SDES Zone Key) The Zone Keys are rotated regularly, (every month). My question is that most attacks on DES require lots of data and brute force, and the user in this case is claiming that with the nature of Maccing there isn't enough data to crack these Message Keys. Any thoughts? [link] [comments] |
Why is modular exponentiation, and not modular multiplication, used in RSA? Posted: 02 Oct 2018 08:52 AM PDT What is the purpose of this? Is it essential to use exponentiation and not multiplication? And if there were to be a multiplication rather than exponentiation based scheme, would it's core principles that make it tick be any different (or would it simply be a lot harder to crack)? [link] [comments] |
Posted: 02 Oct 2018 08:45 PM PDT I want to first thank those that helped in the cryptanalysis of the hand cipher RedDye. Over the past few days, I've furiously coded up and tested what is kind of RedDye Refit and upgrade, BlueDye. The construction uses 256 byte array of 0-255 elements like RC4 and does one swap per round. https://github.com/pvial00/BlueDye The question is, since this cipher resolves the known plaintext attack issue in RedDye. Could this cipher be susceptible to the bias in RC4 and follow-up ciphers? Could it be susceptible to Roo's bias and how would one test for this? [link] [comments] |
Request Fore Resourses/Material about cryptography Posted: 02 Oct 2018 01:05 PM PDT Hello, I am taking a course in Cryptography where we define a cryptographic scheme and we are trying to prove its security using game based techniques and reduction. However, I am not able to understand the lectures from our instructor. Could you please recommend some online resources or books that tackles topics such as Provable security, PRF, Identity-Based Encryption, and Hierarchical Identity-Based Encryption ? Thank you in advance [link] [comments] |
OpenSSL # 1 - Generate Private and Public Keys Posted: 02 Oct 2018 01:02 PM PDT |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment