Questions tagged [cryptography]

Discipline or techniques employed in protecting integrity or secrecy of electronic messages by converting them into unreadable (cipher text) form.

Discipline or techniques employed in protecting integrity or secrecy of electronic messages by converting them into unreadable (cipher text) form. Only the use of a secret key can convert the cipher text back into human readable (clear text) form. Cryptography software and/or hardware devices use mathematical formulas (algorithms) to change text from one form to another.

242 questions
7
votes
2 answers

Store encrypted private keys on-chain

How secure is it to store encrypted private keys on chain ? Are the assets in the example below easer to brute-force than the master-key that encrypts them ? contract MyPrivateKeys { struct encryptedKey { string assetName; address…
dor
  • 91
  • 3
2
votes
1 answer

Algorand: What is the purpose of VRF

In the paper describing Algorand,two reasons are given to use verifiable random functions/cryptographic Sortion: Sortition provides two important properties: First, given a random seed, the VRF outputs a pseudo random hash value, which is…
1
vote
1 answer

Is it possible to create one-time addresses, like in monero?

In http://src.getmonero.org/library/Zero-to-Monero-1-0-0.pdf, chapter "5.2 One-time addresses", there is description of how to create them. The problem is that Monero uses Ed25519 and Ethereum secp256k1. Is it possible to apply the same mathematical…
etam1024
  • 113
  • 3
1
vote
0 answers

Using ECC Brainpool curves instead of Elliptic Curves

I am exploring the use of ECC Brainpool curves instead of elliptic curves for digital signatures in Ethereum. Is this part of the roadmap and/or anyone has experimented with the use of ECC Brainpool Curves?
Nathan Aw
  • 1,954
  • 12
  • 27
1
vote
2 answers

Which is cryptographically harder (higher cost to break), sha256 or secp256k1?

Which has a higher computational cost, to find the private key associated with a signature, or, a pre-image of a sha256 hash?
Lemur
  • 11
  • 1
0
votes
1 answer

Cryptographic limit to total accounts on Ethereum

Factoring in birth day attacks and all that, with 256-bit elliptic curve cryptography, what is the maximum number of accounts that are secure? It isn't 2^256 since then any time you generate a random number you find a used account. Birth day paradox…
Johan
  • 65
  • 5
0
votes
1 answer

Mist Wallet Stuck on "Connected to Node"

It got about 80% of the way through the blockchain download, then it just stopped and went to "finding peers" So I closed the wallet, restarted the PC, and now it just gets stuck on "connected to node". I have since moved the lightchaindata folder…
S.Stevens
  • 101
0
votes
0 answers

Is it still possible to swap erc20 Theta tokens to Theta main net tokens?

Is it still possible to swap erc20 Theta tokens to Theta main net tokens? I have some stored on a ledger that I forgot about and would like to change them obviously! Im hoping this is still possible. any help would be great, thanks in advance!
0
votes
2 answers

Ethereum is not a cryptocurrency?

I am not a fan of cryptocurrencies at all... In my opinion their purpose is just gambling with extra steps. So I also never really looked into them. But recently I started reading about Ethereum and it started to get my interest, and is even getting…
O'Niel
  • 103
  • 3
0
votes
1 answer

Smart contract Diffie-Hellman elliptic curve key exchange

Two accounts want to use a smart contract to exchange (with SSTORE) the public parameters for a Diffie-Hellman key exchange, and use their private keys to generate the shared symmetric key. Is there any publicly deployed contract for this? SmartDHX…
Johan
  • 23
  • 3
0
votes
1 answer

Some problem with key storage

Is there any solution if the key is lost in Ethereum or Bitcoin? Can I use the some algorithm, which can bind key and biometrics, to solve this problem? Why don't Ethereum/Bitcoin use it?
Robert
  • 1
  • 2