• Breaking News

    Sunday, February 3, 2019

    Cryptography NIST plans to complete their post-quantum project in 2022-2024. What are their estimates on quantum computer developments and when organizations should start to implement PQ crypto?

    Cryptography NIST plans to complete their post-quantum project in 2022-2024. What are their estimates on quantum computer developments and when organizations should start to implement PQ crypto?


    NIST plans to complete their post-quantum project in 2022-2024. What are their estimates on quantum computer developments and when organizations should start to implement PQ crypto?

    Posted: 02 Feb 2019 12:09 PM PST

    Intro to Modern Crypto by Katz and Lindell Question and proving encryption correctness

    Posted: 02 Feb 2019 10:31 AM PST

    Hi all,

    I'm learning cryptography from the book Introduction to Modern Cryptography by Katz and Lindell. I have a question directly from the book as well as another to understand modular arithmetic better:

    Proving Decryption Correctness

    For proving the correctness, I mainly have an issue with being good at modular arithmetic.

    I know I need to be substituting known variables in m' to simply and prove m'=m.

    If you could link me to a set of formulas/rules for modular arithmetic that would be super helpful for not just this but other proofs of correctness as well.

    https://i.redd.it/bgor7a86b7e21.png

    Question 11.12 from Katz and Lindell

    Consider a "textbook Rabin" encryption scheme in which a message m belongs to QR_N is encrypted relative to a public key N (where N is a Blum integer) by computing the ciphertext c := [m2 mod N]. Show a chosen­ ciphertext attack on this scheme that recovers the entire private key

    submitted by /u/AppCryptoCK
    [link] [comments]

    History Of Cryptography

    Posted: 02 Feb 2019 09:05 PM PST

    I wanted to share this fascinating article on the history and timeline of cryptography i wrote. https://umento.wordpress.com/2019/01/24/diving-deep-into-cryptography/

    submitted by /u/Alexander_Bourne
    [link] [comments]

    Multiples files crypted with same password = weakness ?

    Posted: 02 Feb 2019 04:17 PM PST

    I have like 100+ files on my job computdr with personnal files,, they are mostly PDF of contract or image. I use AxxCrypt to crypt them and they have all the same password... Is it a weakness ? If an attacker have some decrypted file and can compare it with the crypted files will he find the password or a collusion ?

    (i don't know exactly what algo was used, usually I use veracrypt and mount a virtual crypted harddrive)

    submitted by /u/B3ltal0wda
    [link] [comments]

    waxwing's blog: Finessing commitments

    Posted: 02 Feb 2019 02:06 AM PST

    No comments:

    Post a Comment