Cryptography Diffie–Hellman key exchange question |
- Diffie–Hellman key exchange question
- Does state mean the data that's being worked on currently?
- Discover Decryption Algorithm by Samples
- I submitted here not knowing what the key was (Been in encryption course for 10 weeks) and now we are talking about key generation?
- Been getting some strange emails... One looks like it contains a cryptographic message.
Diffie–Hellman key exchange question Posted: 04 Apr 2019 05:07 PM PDT I am little bit confused about Diffie Hellman key exchange.I have done some fun with small numbers and find situations where computed key exchange and secret key has same result.This is one of them: By changing the constants (g or p) I get different results, but sooner or later I end up with secret leak in computed results (ap, bp). I am not cryptographer or mathematician, so sorry if I miss understand something. How important is what constant values are chosen for p and g and what should I know about their values?From what I know and what I do not, I would say that it is very possible that this happen in larger range (higher p value). EDIT: https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange [link] [comments] |
Does state mean the data that's being worked on currently? Posted: 04 Apr 2019 11:41 PM PDT I have no idea what state means. What does it mean by the adversary starts the hash function with t as it's internal state? like the first step? Please explain. [link] [comments] |
Discover Decryption Algorithm by Samples Posted: 04 Apr 2019 08:25 PM PDT Hello! I have a particular request that I couldn't successfully Google. I have a load of various encrypted files, some of which I also have the decrypted versions of. I was wondering if there is a tool that can compare an encrypted file to its decrypted counterpart and use that information to decrypt other files. If you would like, here are a few samples:
I would be very grateful for any information that can be provided! (And I can provide more samples if necessary.) Edit: It's worth noting that the encryption is done by CypherTec, and the filesizes between encrypted/decrypted files don't change at all. The key(s) (and/or other such elements) are stored off-file, but are inaccessible to me. [link] [comments] |
Posted: 04 Apr 2019 09:44 PM PDT I did not know what a key was or where it even came from. Now we are talking about key generation/distribution. Is this common? When the semester first started he just would use the word key even though this whole time all I knew that it was a string of random bits of data. I just find it odd that we are now talking about it. I feel like we should of done it earlier. [link] [comments] |
Been getting some strange emails... One looks like it contains a cryptographic message. Posted: 04 Apr 2019 09:37 AM PDT Hi all, Ive been receiving some strange emails over the past two months. They are all formatted the same way, but aren't always sent from the same address. I tried to trace back the sender, but came up with nothing. The heading of the emails seem to be poorly written news stories. Some of the emails contain no content, or a link (which I haven't tried clicking on for obvious reasons). One of them however has a very long string of characters which looks like it could be some type of cryptography. Pastebin of cryptographic email: https://pastebin.com/8VqdSQcs Imgur of emails: https://imgur.com/a/h5NbTcX please let me know if you find anything. Thanks! [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment