Most Popular

1500 questions
15
votes
3 answers

Does a partial preimage attack imply a preimage attack?

Let's assume we have an $n$-bit hash function and a $b$-bit partial preimage attack that is faster than brute force. Does this imply a faster than brute force preimage attack on the whole hash? It seems that it does, because if you run the $t<2^b$…
otus
  • 32,132
  • 5
  • 70
  • 165
15
votes
3 answers

Is using a predictable IV with CFB mode safe or not?

While writing this answer, I noted that NIST SP 800-38A says that (emphasis mine): "For the CBC and CFB modes, the IVs must be unpredictable. In particular, for any given plaintext, it must not be possible to predict the IV that will be associated…
Ilmari Karonen
  • 46,120
  • 5
  • 105
  • 181
15
votes
3 answers

Turing's (still?) classified inference engine algorithm?

Does anyone know the algorithm used by Turing's Colossus inference engine, so highly classified that the Brits kept it secret for decades after WW II? Indeed, it may still be classified. Several years ago a colleague of mine, the late Robert…
James Bowery
  • 261
  • 1
  • 7
15
votes
2 answers

Is it possible to utilize an AES-128 encryption hardware unit for AES-256?

There exist processors (for example ARM v8/v9 archicteture based), which cannot do AES-256 hardware based, but are equipped with AES-128 encryption hardware units. Is it possible to utilize an AES-128 encryption hardware unit in some way to speed…
0laf
  • 153
  • 5
15
votes
3 answers

Does composing multiple substitution ciphers improve security?

Will using two substitution ciphers one after the another be more secure than using single substitution cipher?
15
votes
4 answers

How to deal with collisions in Bitcoin addresses?

When creating a Bitcoin account, you need to issue a couple of private/public ECDSA keys. Then, you derive your account address by taking a 160-bit hash (through SHA-256 and RIPEMD) of the public key and use a custom Base 58 algorithm to convert it…
perror
  • 605
  • 2
  • 10
  • 28
15
votes
5 answers

Is it better to encrypt before compression or vice versa?

Is it better to encrypt a plain text file before compression, or vice versa?
fola
  • 151
  • 1
  • 1
  • 5
15
votes
3 answers

Where do I securely store the key for a system where the source is visible?

I have a customer with an Access database (ugh!) in which credit cards are stored in plaintext (yikes!), so amongst other changes I'm doing in the app, I'm applying some encryption in there. I've used Rijndael as the algorithm of choice, but I'm…
Rob Cowell
  • 253
  • 1
  • 6
15
votes
2 answers

Given enough RSA signature values, is it possible to determine the public key value?

Given enough RSA signature values, is it possible to determine which public key is required to verify the values? Could there be enough information to establish which key is required? Is there anything in the RSA scheme to retrieve the modulus,…
Maarten Bodewes
  • 92,551
  • 13
  • 161
  • 313
15
votes
4 answers

Proof of non-membership on a Merkle tree?

Assume a user $U$ and a server $S$. $U$ uploads its data and wants later to perform an authenticity check. It also sends a Merkle tree to the server. Let’s say we would like $U$ to ask for a specific element in the tree. $S$ then returns the leaf…
curious
  • 6,160
  • 6
  • 32
  • 45
15
votes
3 answers

Do I have to recompute all hashes if I change the work factor in bcrypt?

The well-known article about why we should use bcrypt for hashing passwords mentions the work factor - some parameter to the algorithm that determines how long one hashing should be in terms of number of computations. This as the article says allows…
sharptooth
  • 399
  • 2
  • 9
15
votes
6 answers

Difference between encrypting something and hashing something

What is the difference between encrypting something and hashing something? in what situations would I want one or the other?
Joel B
  • 273
  • 1
  • 2
  • 7
15
votes
2 answers

RSA Proof of Correctness

Can anyone provide an extended (and well explained) proof of correctness of the RSA Algorithm? And why is it needed? I can't say that this or this helped me much, I'd like a more detailed and newbie like explanation, if you don't mind too much... ;)
Matteo
  • 1,131
  • 2
  • 12
  • 22
15
votes
2 answers

Attacking RSA signature verification that ignores padding

I am looking at a RSA signature verification that is quite obviously flawed and am wondering if there's a way to exploit that flaw in practice. Signature is generated using RSA with PKCS 1.5 padding, i.e. $S = M^d \mod N$, where $M$ is a padded…
Andrey
  • 847
  • 6
  • 11
15
votes
1 answer

Security of N bit HMAC

Lets say that I am using 128 bit HMAC. How many operations are needed to find a "non secure" message. Is a birthday attack possible?
ralu
  • 451
  • 5
  • 11