InsideDarkWeb.com
  1. All Categories
  2. Cryptography

Cryptography : Recent Questions and Answers

Find answers to your questions about Cryptography or help others by answering their Cryptography questions.

What is this problem called and is it hard? given $g^x$ output ($g^y, xy$)

Assume that $G$ is any cyclic group where the discrete log problem is hard, such as the elliptic curve group. Let $g$ be some generator of $G$....

Asked on 11/28/2021

1 answer

With RSA or ECC, if I encrypt my private key with my public key, is there a way to recover my private key?

Is there an algorithmic, mathematical, technical or implementation "hack" to recover the private key or is it definitively encrypted without any particular mathematical property, like any message M?...

Asked on 11/28/2021

2 answer

What will be appropriate AES padding characters?

I am completely noob in terms of cryptography and security.So I decided AES Cipher for encrypting my data. I pad my input data String with blank white spaces to...

Asked on 11/23/2021 by user3769778

2 answer

Why does verifiable secret sharing with an honest majority require a broadcast channel?

In the information-theoretic model with active adversaries, it seems to be well-known that no protocols with exact reconstruction of the secret exist for the task of verifiable secret sharing (VSS)...

Asked on 11/23/2021

1 answer

How does RSA signature verification work?

I understand how the RSA algorithm works for encryption and decryption purposes but I don't get how signing is done. Here's what I (think) I know and is common practice:If...

Asked on 11/19/2021

3 answer

Is it possible to compute the y-coordinate of a point on SECP256K1, given only the x-coordinate

Given an x-coordiante of a point on the SECP256K1 curve, is it possible to calculate the corresponding y-coorindate? (Assuming the point is a verifying public key that complies with the...

Asked on 11/17/2021

1 answer

Padding Oracle Attack with AES-128-CTR and MAC

Assume Alice and Bob are communicating using 'MAC then Encrypt' paradigm.Specifically, they are using HMAC with SHA256 as the hash function...

Asked on 11/13/2021 by AnswerFinder95

1 answer

Generate AES key from weak string

I'm trying to generate AES256 key from user input password.The size of the password can be anything from 4 bytes long to 32 bytes long but let's assumeit...

Asked on 11/13/2021 by user81531

1 answer

Are the Serpent Test Vectors incorrect?

I have recently written an implementation of Serpent and was testing it against known vectors to no avail. Using 256-bit key, I compared my encryption to the test vectors...

Asked on 11/11/2021

1 answer

What is the best deterministic authenticated encryption algorithm to date?

We have a main database where certain properties are PII and want to setup a read-only replica so other parts of the business can able to access (e.g. analytics) We'd...

Asked on 11/08/2021 by gtramontina

0 answer

Ask a Question

Get help from others!

© 2021 InsideDarkWeb.com. All rights reserved.