• Breaking News

    Monday, April 15, 2019

    Cryptography Quantum Cryptography (not QKD but the "real" stuff) Explained

    Cryptography Quantum Cryptography (not QKD but the "real" stuff) Explained


    Quantum Cryptography (not QKD but the "real" stuff) Explained

    Posted: 14 Apr 2019 08:52 AM PDT

    Hi, in case you are interested, here is a decent blog post that explains the basics of quantum cryptography. I'm not talking about QKD, I'm talking about techniques to encrypt quantum data on a quantum computer (the blog article explains why it is interesting to do so) such as Quantum One-Time Pad and 2-designs.

    For a TL;DR version, here is a relevant Slashdot submission that a colleague of mine wrote (you are welcome to upvote it if you like it!). Quote:

    However, what most analysts fail to realize is that the post-quantum scenario can only be a transient one, caused by the initially prohibitive cost of the technology. If the history of computing teaches us something is that mass adoption follows soon afterward and, with mass adoption, networks arise. So, if we look at a future scenario where quantum computers are ubiquitous and connected through dedicated networks (a "quantum internet"), then post-quantum cryptography is not going to be enough, and we have to come up with new ideas to secure such a new communication and computing infrastructure.

    submitted by /u/shiburaya
    [link] [comments]

    Is the hash computation done in parallel or series?

    Posted: 14 Apr 2019 05:21 PM PDT

    In the image I linked from https://www.researchgate.net/file.PostFileLoader.html?id=534b393ad3df3e04508b45ad&assetKey=AS%3A273514844622849%401442222429260

    It's not clear to me if the values being computed in a, b, c, d, e, f, g, h, T1 and T2 are being done in parallel or series. This is because I am trying to write the SHA-256 myself in VHDL (Hardware language).

    So for eg. in one iteration, let's just say in the iteration number 3:

    e = d + T1

    Does e take the value of d and T1 from iteration number 2, or the value of T1 from the current iteration 3 which it was just computed from?

    Thanks

    submitted by /u/gradschl
    [link] [comments]

    Question about Differential Power Analysis (x-posted on r/cryptography)

    Posted: 14 Apr 2019 04:59 PM PDT

    Hey all,

    Sorry if this is not the appropriate place for this. I just have one simple question. In Kocher's paper on differential power analysis, where he describes the selection function ( LSB of sbox( x (xor) Kn)), how is the selection made? I understand that its the LSB of the sbox value of the plaintext (randomly generated) and the key byte guess (in an unknown key attack which is what we are doing). Is sbox standard for AES? I am sure it can be changed. So if i cannot compute the sbox output of the above value, how is it selected? Is it inferred from the power trace? Let me know if I need to clarify something or if this needs to be posted elsewhere

    submitted by /u/the_medicine
    [link] [comments]

    RSA Attack Technique Help

    Posted: 14 Apr 2019 05:56 AM PDT

    Given N(Modulus), E(Public Exponent) and a pair of ciphertext/plaintext. What attacks/techniques could I try to apply?

    submitted by /u/xDatAzn
    [link] [comments]

    I'm writing a book and really need your help!

    Posted: 14 Apr 2019 04:55 AM PDT

    Hi All,

    I'm writing a book about a genius hacker who is attempting to break into a highly secure vault. With the help of some amazing redditors from this thread, I think that the best way to write this is that the vault uses a PRNG that the MC eventually figures out the algorithm for. I am aware of the practical limitations of this, but this is a book, so extraordinary things are allowed to happen, and the MC is supposed to be a genius, so there's room for her to do highly unlikely things that could even be considered impossible.

    What I'm struggling with is how I would describe her doing this - what would she be looking for? Would the algorithm be hidden in the code somewhere? What are the terms/phrases she should use during her search?

    I've done a lot of research but I'm struggling to pull it all together in a way that's cohesive. Any help would be greatly appreciated!

    Side note: the MC actually wrote the algorithm but has no memory of it (for various plot-related reasons), however I'm toying with the idea that she can figure out the key (?) because it's something personally related to her (is that even possible?)

    submitted by /u/Dmmonique
    [link] [comments]

    No comments:

    Post a Comment