Cryptography Quantum Cryptography (not QKD but the "real" stuff) Explained |
- Quantum Cryptography (not QKD but the "real" stuff) Explained
- Is the hash computation done in parallel or series?
- Question about Differential Power Analysis (x-posted on r/cryptography)
- RSA Attack Technique Help
- I'm writing a book and really need your help!
Quantum Cryptography (not QKD but the "real" stuff) Explained Posted: 14 Apr 2019 08:52 AM PDT Hi, in case you are interested, here is a decent blog post that explains the basics of quantum cryptography. I'm not talking about QKD, I'm talking about techniques to encrypt quantum data on a quantum computer (the blog article explains why it is interesting to do so) such as Quantum One-Time Pad and 2-designs. For a TL;DR version, here is a relevant Slashdot submission that a colleague of mine wrote (you are welcome to upvote it if you like it!). Quote:
[link] [comments] |
Is the hash computation done in parallel or series? Posted: 14 Apr 2019 05:21 PM PDT In the image I linked from https://www.researchgate.net/file.PostFileLoader.html?id=534b393ad3df3e04508b45ad&assetKey=AS%3A273514844622849%401442222429260 It's not clear to me if the values being computed in a, b, c, d, e, f, g, h, T1 and T2 are being done in parallel or series. This is because I am trying to write the SHA-256 myself in VHDL (Hardware language). So for eg. in one iteration, let's just say in the iteration number 3: e = d + T1 Does e take the value of d and T1 from iteration number 2, or the value of T1 from the current iteration 3 which it was just computed from? Thanks [link] [comments] |
Question about Differential Power Analysis (x-posted on r/cryptography) Posted: 14 Apr 2019 04:59 PM PDT Hey all, Sorry if this is not the appropriate place for this. I just have one simple question. In Kocher's paper on differential power analysis, where he describes the selection function ( LSB of sbox( x (xor) Kn)), how is the selection made? I understand that its the LSB of the sbox value of the plaintext (randomly generated) and the key byte guess (in an unknown key attack which is what we are doing). Is sbox standard for AES? I am sure it can be changed. So if i cannot compute the sbox output of the above value, how is it selected? Is it inferred from the power trace? Let me know if I need to clarify something or if this needs to be posted elsewhere [link] [comments] |
Posted: 14 Apr 2019 05:56 AM PDT Given N(Modulus), E(Public Exponent) and a pair of ciphertext/plaintext. What attacks/techniques could I try to apply? [link] [comments] |
I'm writing a book and really need your help! Posted: 14 Apr 2019 04:55 AM PDT Hi All, I'm writing a book about a genius hacker who is attempting to break into a highly secure vault. With the help of some amazing redditors from this thread, I think that the best way to write this is that the vault uses a PRNG that the MC eventually figures out the algorithm for. I am aware of the practical limitations of this, but this is a book, so extraordinary things are allowed to happen, and the MC is supposed to be a genius, so there's room for her to do highly unlikely things that could even be considered impossible. What I'm struggling with is how I would describe her doing this - what would she be looking for? Would the algorithm be hidden in the code somewhere? What are the terms/phrases she should use during her search? I've done a lot of research but I'm struggling to pull it all together in a way that's cohesive. Any help would be greatly appreciated! Side note: the MC actually wrote the algorithm but has no memory of it (for various plot-related reasons), however I'm toying with the idea that she can figure out the key (?) because it's something personally related to her (is that even possible?) [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment