Cryptography NIST plans to complete their post-quantum project in 2022-2024. What are their estimates on quantum computer developments and when organizations should start to implement PQ crypto? |
- NIST plans to complete their post-quantum project in 2022-2024. What are their estimates on quantum computer developments and when organizations should start to implement PQ crypto?
- Intro to Modern Crypto by Katz and Lindell Question and proving encryption correctness
- History Of Cryptography
- Multiples files crypted with same password = weakness ?
- waxwing's blog: Finessing commitments
Posted: 02 Feb 2019 12:09 PM PST |
Intro to Modern Crypto by Katz and Lindell Question and proving encryption correctness Posted: 02 Feb 2019 10:31 AM PST Hi all, I'm learning cryptography from the book Introduction to Modern Cryptography by Katz and Lindell. I have a question directly from the book as well as another to understand modular arithmetic better: Proving Decryption Correctness For proving the correctness, I mainly have an issue with being good at modular arithmetic. I know I need to be substituting known variables in m' to simply and prove m'=m. If you could link me to a set of formulas/rules for modular arithmetic that would be super helpful for not just this but other proofs of correctness as well. https://i.redd.it/bgor7a86b7e21.png Question 11.12 from Katz and Lindell Consider a "textbook Rabin" encryption scheme in which a message m belongs to QR_N is encrypted relative to a public key N (where N is a Blum integer) by computing the ciphertext c := [m2 mod N]. Show a chosen ciphertext attack on this scheme that recovers the entire private key [link] [comments] |
Posted: 02 Feb 2019 09:05 PM PST I wanted to share this fascinating article on the history and timeline of cryptography i wrote. https://umento.wordpress.com/2019/01/24/diving-deep-into-cryptography/ [link] [comments] |
Multiples files crypted with same password = weakness ? Posted: 02 Feb 2019 04:17 PM PST I have like 100+ files on my job computdr with personnal files,, they are mostly PDF of contract or image. I use AxxCrypt to crypt them and they have all the same password... Is it a weakness ? If an attacker have some decrypted file and can compare it with the crypted files will he find the password or a collusion ? (i don't know exactly what algo was used, usually I use veracrypt and mount a virtual crypted harddrive) [link] [comments] |
waxwing's blog: Finessing commitments Posted: 02 Feb 2019 02:06 AM PST |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment