Questions tagged [decryption]
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Only authorized parties can decipher a ciphertext back to plaintext and access the original information.
272
questions
0
votes
0
answers
27
views
Is it possible to execute a plaintext attack on a slidefair cipher
there.
Ive got the cipher text: GKFJMNMJLRHLJKSMPFLMYCS
And an answer: EEADIHHHJFEFHENGLZGKWQP
The person that encrypted this ...
0
votes
0
answers
26
views
How to break a Vigenère cipher with a partial plaintext and key?
I have an question regarding Vigenère decryption. Is it possible to break a Vigenère with a partial answer key?
Ive got the cipher text: GKFJMNMJLRHLJKSMPFLMYCS
And ...
0
votes
0
answers
35
views
Proof of Decryption in a Chinese Remainder Theorem-Based Encryption Scheme
I've been studying a cryptographic scheme that uses the Chinese Remainder Theorem (CRT) for decryption. Here's a brief overview of the encryption and decryption process:
Setup:
Alice chooses two ...
1
vote
1
answer
51
views
lattice RLWE encryption and decryption process
I am here trying to solve an issue that I face a lot during solving RLWE.
The issue is that I am not able to retrieve the original message after the decryption process.
I use the following encryption ...
2
votes
2
answers
172
views
Cryptography elements requested for a plot in a story
experts. I am working on a story that involves a terabyte portable drive that has been encrypted by Person 1 and needs to be decrypted by Person 2 (Person 1 is deceased by that point).
Person 1 and ...
0
votes
0
answers
41
views
Parallel block cipher in CTR mode and variable number of threads: how to deal with internal state and permit decryption?
I'm implementing a parallel block cipher (Morus, to be precise) in CTR mode and I'd like to make it flexible with respect to the number of threads. It is not difficult per se, as I can partition the ...
1
vote
1
answer
169
views
Can the RSA public key be used for both encryption and decryption?
My understanding of RSA Cryptography is that the Public Key is used for data encryption and Private Key is used for data decryption. But on this website(https://www.devglan.com/online-tools/rsa-...
1
vote
3
answers
137
views
Why do we need more security than the private key distribution?
I'm new to cryptography and have question about private key distribution. If we are able to send private keys to the encoder, then it means that we are able to send private keys to someone, which ...
0
votes
0
answers
53
views
What is a generalized algorithm to find five $z$-bit words for the inverse of $\theta$ function in the Keccak-$f$ permutation?
This implementation of the inverse of the Keccak-$f$ permutation contains five 64-bit words (called “inversePositions64” in the code) for the inverse of $\theta$ function:
...
1
vote
1
answer
78
views
"Appendable" encryption scheme
Are there any encryption schemes that could be classified as "appendable"?
By appendable I mean being able to add new data to the end of already encrypted data, without needing to decrypt ...
0
votes
1
answer
83
views
Question about error-Correction Code on Paper titled 'A New Public-Key Cryptosystem via Mersenne Number"
I've been implementing a cryptosystem outlined here, which relies on Mersenne Numbers, as part of my coursework in a Cryptography class.
In this cryptosystem, both encryption and decryption require ...
0
votes
0
answers
66
views
Reaching the bound of Boneh and Durfee Attack
According to the paper, theoretically,we can get $\delta=0.292 \lt 1-\frac{1}{\sqrt{2}}$,but how to set the lattice and implement it in sagemath? I generated some data
by
...
0
votes
0
answers
42
views
Decrypting Message Using One-Time Pad with Repeated Key [duplicate]
I'm trying to decrypt a message that has been encrypted using a one-time pad with a repeated key. The encryption technique involves using the same key twice. We know the message was encrypted with $k =...
0
votes
2
answers
190
views
Is it possible to perform reverse rsa encryption ? (using the public key for decrypting and the private key for encrypting)
Simple question, but I couldn’t find an answer as I know about signing but don’t want it.
The aim would be to encrypt someone’s bet parameter as a short message using the private key and use the ...
0
votes
0
answers
125
views
Homomorphic Decryption with the Encryption (ciphertext) of Secret key for Bootstrapping purpose
The section 3.1 of the GHS11 mentions that:
Given the $q_L$-ciphertext $c = (c_0, c_1)$ (that encrypts a polynomial $a \in F_2[X]/F(X)$), we postprocess it to get $c^\prime = (c_0 + c^*, c_1) \text{ ...