1. All Categories
2. Cryptography

# Cryptography : Recent Questions and Answers

## What is this problem called and is it hard? given $g^x$ output ($g^y, xy$)

Assume that $G$ is any cyclic group where the discrete log problem is hard, such as the elliptic curve group. Let $g$ be some generator of $G$....

## With RSA or ECC, if I encrypt my private key with my public key, is there a way to recover my private key?

Is there an algorithmic, mathematical, technical or implementation "hack" to recover the private key or is it definitively encrypted without any particular mathematical property, like any message M?...

## What will be appropriate AES padding characters?

I am completely noob in terms of cryptography and security.So I decided AES Cipher for encrypting my data. I pad my input data String with blank white spaces to...

## Why does verifiable secret sharing with an honest majority require a broadcast channel?

In the information-theoretic model with active adversaries, it seems to be well-known that no protocols with exact reconstruction of the secret exist for the task of verifiable secret sharing (VSS)...

## How does RSA signature verification work?

I understand how the RSA algorithm works for encryption and decryption purposes but I don't get how signing is done. Here's what I (think) I know and is common practice:If...

## Is it possible to compute the y-coordinate of a point on SECP256K1, given only the x-coordinate

Given an x-coordiante of a point on the SECP256K1 curve, is it possible to calculate the corresponding y-coorindate? (Assuming the point is a verifying public key that complies with the...

## Padding Oracle Attack with AES-128-CTR and MAC

Assume Alice and Bob are communicating using 'MAC then Encrypt' paradigm.Specifically, they are using HMAC with SHA256 as the hash function...

## Generate AES key from weak string

I'm trying to generate AES256 key from user input password.The size of the password can be anything from 4 bytes long to 32 bytes long but let's assumeit...

## Are the Serpent Test Vectors incorrect?

I have recently written an implementation of Serpent and was testing it against known vectors to no avail. Using 256-bit key, I compared my encryption to the test vectors...

## What is the best deterministic authenticated encryption algorithm to date?

We have a main database where certain properties are PII and want to setup a read-only replica so other parts of the business can able to access (e.g. analytics) We'd...