Most Popular
1500 questions
14
votes
3 answers
Why is ciphertext from low entropy plaintext not compressible?
This comes following a discussion with a colleague.
My plaintext file plain consists of a about 100,000 lines of "all work and
no play...". It's size is: 2.2 MB.
Compressed it is: 5.4kB
I encrypt the original:
openssl aes-128-cbc -in plain -out…
Bill
- 293
- 2
- 5
14
votes
4 answers
Properties of PRNG / Hashes?
There are a lot of quite elaborate PRNG's out there (e.g. Mersenne Twister et.al.), and they have some important properties, especially when it comes to crypto applications.
So, I was wondering how hash functions like SHA1 or MD5 would perform in…
bitmask
- 283
- 1
- 9
14
votes
1 answer
Why do crypto libs use table lookups when they're vulnerable to timing attacks?
AESEngine.java, from BouncyCastle, uses table lookups as does aes_x86core.c, in OpenSSL. But per Cache-timing attacks on AES table lookups like what OpenSSL and BouncyCastle are doing are vulnerable to timing attacks. So why would they use them?
Julie Applegate
- 175
- 5
14
votes
2 answers
What's the GCM-SHA 256 of a TLS protocol?
If we read the Google line information about how the cypher the https communication, it reads:
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
I understand it's using ECDHE to exchange keys, using ECDSA as digital signature and making the symmetric…
MyUserIsThis
- 243
- 1
- 2
- 7
14
votes
3 answers
Lamport signature: How many signatures are needed to forge a signature?
Lamport signature: Signing the message Note that now Alice's private key is used and should never be used again. The other 256 random numbers that she did not use for the signature she must never publish or use. Preferably she should delete them;…
Sup3rgnu
- 359
- 2
- 6
14
votes
4 answers
Can machine learning analyze random number generator?
I'm studying for random number generators(RNG) and I saw about machine learning a few days ago.
So I searched analysis of RNG using machine learning.
But I couldn't find such fields.
Are there such examples for analysis of RNG using machine…
Tylor Yoo
- 141
- 1
- 4
14
votes
2 answers
Encrypt-then-MAC: Do I need to authenticate the IV?
In the setting of Encrypt-then-MAC, do I need to include the IV in what I'm HMACing, or is authenticating just the AES-encrypted data sufficient?
fadedbee
- 916
- 1
- 10
- 29
14
votes
1 answer
Making ECDSA public keys one bit shorter
In compressed form, ECDSA public keys are one bit larger than the curve size. There are some situations where this extra bit is extremely inelegant. So I had the following idea as a way to remove it.
For a public key, the extra bit is always zero…
David Schwartz
- 4,729
- 19
- 31
14
votes
2 answers
128 bit hash with least chance of collision?
I'm building a storage system for JSON documents where they are looked up on a 128 bit key. These JSON documents have a timestamp within them, but apart from that are user-entered data. These JSON documents can have within them private information,…
Max
- 275
- 1
- 2
- 6
14
votes
4 answers
Do parts of a hash carry the properties of the entire hash?
When I need to generate unique id's based on some information hashing is typical choice. However, sometimes that id needs to be of a particular size. I've seen a lot of schemes (HMAC-MD5-96 in SSH, CGA in SeND for IPv6) that use a portion of a…
Marcin
- 263
- 1
- 6
14
votes
3 answers
What is the best way to put a backdoor in an encryption system?
How can you put a backdoor into an encryption algorithm? Are there any techniques that can be used to reduce the time it takes to break a key?
I am looking for practical examples encryption schemes that have backdoors, because they were designed to…
Goose3gg
- 141
- 5
14
votes
1 answer
Why was ISO10126 Padding Withdrawn?
Wikipedia mentions ISO10126 Padding has been withdrawn, but doesn't say why. Also there were no news reports about this, as far as I can see.
Why was it withdrawn? Are there security flaws? Is there maybe a new version?
Dexter
- 637
- 1
- 6
- 10
14
votes
3 answers
How can I calculate the SHA-256 "midstate"?
Recently I've been trying to implement some Bitcoin-related code, and I've stumbled upon a weird concept, a SHA-256 "midstate". Some explanation is given here.
The general concept is that Bitcoin relies on performing SHA hashing of a 128 byte data…
ThePiachu
- 1,679
- 2
- 18
- 25
14
votes
3 answers
Entropy of two concatenated random values
In this Intel blog posting, the author claims:
The amount of work required to brute-force predict a random value that has n bits of entropy is $O(2^n)$. If you concatenate two values together, the entropy required to brute force the result becomes…
user13741
- 2,627
- 11
- 16
14
votes
4 answers
Tactics available to help prove security of a new system?
I believe that the accepted tactic to "prove" a system as secure is to allow the crypto-community to review it and if no vulnerabilities are found over a long period of time (5 or 6 years), then a new system can be accepted as secure until proven…
Corey Ogburn
- 851
- 7
- 18