Skip to main content

Questions tagged [keys]

Private and secret keys consists of secret information used as input to various kinds of cryptographic algorithms such as encryption, signature and MAC to select the concrete transformation done by the algorithm.

2 votes
1 answer
413 views

How wrong is NIST 800-89's Partial Public Key Validation for RSA step e?

NIST 800-89 Recommendation for Obtaining Assurances for Digital Signature Applications has recommendations for (Explicit) Partial Public Key Validation for RSA which include an example method. It's ...
fgrieu's user avatar
  • 143k
0 votes
0 answers
26 views

How to remap right shift to backslash in Ubuntu 24.04? [closed]

I want to remap Right-Shift to '/' and and Left-Shift + Right-Shift to '?'. I tried to use Input Remapper, Tweak, and XModMap, but their mappings do not work for terminals from some reason. I wonder ...
Ananta's user avatar
  • 31
0 votes
0 answers
27 views

Is it possible to execute a plaintext attack on a slidefair cipher

there. Ive got the cipher text: GKFJMNMJLRHLJKSMPFLMYCS And an answer: EEADIHHHJFEFHENGLZGKWQP The person that encrypted this ...
whenyoucantfindapassword's user avatar
0 votes
0 answers
26 views

How to break a Vigenère cipher with a partial plaintext and key?

I have an question regarding Vigenère decryption. Is it possible to break a Vigenère with a partial answer key? Ive got the cipher text: GKFJMNMJLRHLJKSMPFLMYCS And ...
whenyoucantfindapassword's user avatar
1 vote
0 answers
41 views

In Kerberos, is the "Authentication Server" the only "Trusted Third Party"? Or is "Ticket Granting Server" also a "Trusted Third Party"? [closed]

I know that AS (Authentication Server) is a TTP (Trusted Third Party) because it generates keys for two entities (for the client and the TGS). But what about TGS (Ticket Granting Server)? It also ...
allexj's user avatar
  • 51
0 votes
0 answers
22 views

Master Key/Certificate for encyption tenant kek/dek keys

I'm building multi-tenant solution (not in cloud) where we need to store sensitive data which should be encrypted. Some of our clients want to bring own keys (BYOK). Each tenant has own instance of ...
dariol's user avatar
  • 101
4 votes
1 answer
114 views

Is there any cryptography-based assured data deletion technique currently as a standard?

I've recently read part of a book exploring secure data deletion techniques for many storage mediums. In particular, I read about assured data deletion techniques developed for data outsourced to the ...
Aljndrop's user avatar
0 votes
0 answers
33 views

Is it possible for a given plaintext and ciphertext to have two different keys? [duplicate]

This has probably been asked before but for a given ciphertext and plaintext pair, is it possible to have two different keys producing said pair? Or there are no collisions in AES, unlike hashing ...
user2338802's user avatar
2 votes
1 answer
78 views

Signature Chains: Ensuring Authenticity and Trust

I'm studying for an exam and came across this question: When an electronic signature of a message claimed to be produced by Alice is verified we typically verify (at least the first time): that the ...
user1's user avatar
  • 35
0 votes
1 answer
64 views

Is there a way to defeat statistical information leak in Vigenère cipher when the ciphertext is reasonably larger than the key size?

I read in this answer here that if the ciphertext is reasonably larger than the key size, Vigenère cipher is easily breakable. Is there a way to repeat the key if it is reasonably smaller that the ...
alpominth's user avatar
  • 393
2 votes
1 answer
209 views

Can we use several times the same RSA and ECC keys?

For RSA or elliptic cryptography, can we use the same public/private keys for several exchanges, or is that unsafe? Does it lower the security of the protocol? To me it doesn't matter, as receiving ...
Wheatley's user avatar
  • 147
1 vote
0 answers
30 views

Key binding with hidden public key

In my scenario we have the Issuer I, Verifier V and Prover P. Now the prover send some messages to I and I signs these messages with I's private key. These messages can be easily sent from P to V and ...
JNies's user avatar
  • 11
0 votes
1 answer
71 views

Shared Key message-encryption multiple receiver communication

Say there are 5 parties. 1 is the sender, and 4 are the receivers. The sender has a unique shared key with each receiver. k1 - between sender and receiver1 k2 - between sender and receiver2 k3 - ...
user113791's user avatar
0 votes
1 answer
76 views

Can a PPT adversary get secret $a$ from public messages $m_i=x_i-a \mod p-1$ for i=1,2, ...,n?

Consider I have a secret $a \in Z_P^*$ and n public messages where $m_i=x_i -a \mod p-1$ and $x_i \in Z_p$ for i=1,2, ..., n. Given that $a$ and $x_i$ for $i=1,2, ..., n$ are secrets, can a PPT ...
Mahmoud Abdelsatar's user avatar
1 vote
1 answer
72 views

Is KangarooTwelve hash function suitable for generating very large key material as Shake-256 is?

If I take a large truly random portion of data, I know that I can generate a 2048-bits key with it (assuming the random data has more entropy than the key). I read in this forum that Shake-256 has ...
alpominth's user avatar
  • 393

15 30 50 per page
1
2 3 4 5
60