Skip to main content

Questions tagged [decryption]

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Only authorized parties can decipher a ciphertext back to plaintext and access the original information.

0 votes
0 answers
27 views

Is it possible to execute a plaintext attack on a slidefair cipher

there. Ive got the cipher text: GKFJMNMJLRHLJKSMPFLMYCS And an answer: EEADIHHHJFEFHENGLZGKWQP The person that encrypted this ...
whenyoucantfindapassword's user avatar
0 votes
0 answers
26 views

How to break a Vigenère cipher with a partial plaintext and key?

I have an question regarding Vigenère decryption. Is it possible to break a Vigenère with a partial answer key? Ive got the cipher text: GKFJMNMJLRHLJKSMPFLMYCS And ...
whenyoucantfindapassword's user avatar
0 votes
0 answers
35 views

Proof of Decryption in a Chinese Remainder Theorem-Based Encryption Scheme

I've been studying a cryptographic scheme that uses the Chinese Remainder Theorem (CRT) for decryption. Here's a brief overview of the encryption and decryption process: Setup: Alice chooses two ...
wajde's user avatar
  • 1
1 vote
1 answer
51 views

lattice RLWE encryption and decryption process

I am here trying to solve an issue that I face a lot during solving RLWE. The issue is that I am not able to retrieve the original message after the decryption process. I use the following encryption ...
A. H's user avatar
  • 33
2 votes
2 answers
172 views

Cryptography elements requested for a plot in a story

experts. I am working on a story that involves a terabyte portable drive that has been encrypted by Person 1 and needs to be decrypted by Person 2 (Person 1 is deceased by that point). Person 1 and ...
Fritz loebl's user avatar
0 votes
0 answers
41 views

Parallel block cipher in CTR mode and variable number of threads: how to deal with internal state and permit decryption?

I'm implementing a parallel block cipher (Morus, to be precise) in CTR mode and I'd like to make it flexible with respect to the number of threads. It is not difficult per se, as I can partition the ...
biagiop1986's user avatar
1 vote
1 answer
169 views

Can the RSA public key be used for both encryption and decryption?

My understanding of RSA Cryptography is that the Public Key is used for data encryption and Private Key is used for data decryption. But on this website(https://www.devglan.com/online-tools/rsa-...
John Hpa's user avatar
  • 113
1 vote
3 answers
137 views

Why do we need more security than the private key distribution?

I'm new to cryptography and have question about private key distribution. If we are able to send private keys to the encoder, then it means that we are able to send private keys to someone, which ...
P.A.M's user avatar
  • 113
0 votes
0 answers
53 views

What is a generalized algorithm to find five $z$-bit words for the inverse of $\theta$ function in the Keccak-$f$ permutation?

This implementation of the inverse of the Keccak-$f$ permutation contains five 64-bit words (called “inversePositions64” in the code) for the inverse of $\theta$ function: ...
lyrically wicked's user avatar
1 vote
1 answer
78 views

"Appendable" encryption scheme

Are there any encryption schemes that could be classified as "appendable"? By appendable I mean being able to add new data to the end of already encrypted data, without needing to decrypt ...
Treday's user avatar
  • 11
0 votes
1 answer
83 views

Question about error-Correction Code on Paper titled 'A New Public-Key Cryptosystem via Mersenne Number"

I've been implementing a cryptosystem outlined here, which relies on Mersenne Numbers, as part of my coursework in a Cryptography class. In this cryptosystem, both encryption and decryption require ...
Nuno Marques's user avatar
0 votes
0 answers
66 views

Reaching the bound of Boneh and Durfee Attack

According to the paper, theoretically,we can get $\delta=0.292 \lt 1-\frac{1}{\sqrt{2}}$,but how to set the lattice and implement it in sagemath? I generated some data by ...
Cred Mao's user avatar
0 votes
0 answers
42 views

Decrypting Message Using One-Time Pad with Repeated Key [duplicate]

I'm trying to decrypt a message that has been encrypted using a one-time pad with a repeated key. The encryption technique involves using the same key twice. We know the message was encrypted with $k =...
crypTOl23's user avatar
0 votes
2 answers
190 views

Is it possible to perform reverse rsa encryption ? (using the public key for decrypting and the private key for encrypting)

Simple question, but I couldn’t find an answer as I know about signing but don’t want it. The aim would be to encrypt someone’s bet parameter as a short message using the private key and use the ...
user2284570's user avatar
0 votes
0 answers
125 views

Homomorphic Decryption with the Encryption (ciphertext) of Secret key for Bootstrapping purpose

The section 3.1 of the GHS11 mentions that: Given the $q_L$-ciphertext $c = (c_0, c_1)$ (that encrypts a polynomial $a \in F_2[X]/F(X)$), we postprocess it to get $c^\prime = (c_0 + c^*, c_1) \text{ ...
kindi's user avatar
  • 11

15 30 50 per page
1
2 3 4 5
19