Questions tagged [keys]
Private and secret keys consists of secret information used as input to various kinds of cryptographic algorithms such as encryption, signature and MAC to select the concrete transformation done by the algorithm.
887
questions
2
votes
1
answer
413
views
How wrong is NIST 800-89's Partial Public Key Validation for RSA step e?
NIST 800-89 Recommendation for Obtaining Assurances for Digital Signature Applications has recommendations for (Explicit) Partial Public Key Validation for RSA which include an example method. It's ...
0
votes
0
answers
26
views
How to remap right shift to backslash in Ubuntu 24.04? [closed]
I want to remap Right-Shift to '/' and and Left-Shift + Right-Shift to '?'. I tried to use Input Remapper, Tweak, and XModMap, but their mappings do not work for terminals from some reason. I wonder ...
0
votes
0
answers
27
views
Is it possible to execute a plaintext attack on a slidefair cipher
there.
Ive got the cipher text: GKFJMNMJLRHLJKSMPFLMYCS
And an answer: EEADIHHHJFEFHENGLZGKWQP
The person that encrypted this ...
0
votes
0
answers
26
views
How to break a Vigenère cipher with a partial plaintext and key?
I have an question regarding Vigenère decryption. Is it possible to break a Vigenère with a partial answer key?
Ive got the cipher text: GKFJMNMJLRHLJKSMPFLMYCS
And ...
1
vote
0
answers
41
views
In Kerberos, is the "Authentication Server" the only "Trusted Third Party"? Or is "Ticket Granting Server" also a "Trusted Third Party"? [closed]
I know that AS (Authentication Server) is a TTP (Trusted Third Party) because it generates keys for two entities (for the client and the TGS).
But what about TGS (Ticket Granting Server)? It also ...
0
votes
0
answers
22
views
Master Key/Certificate for encyption tenant kek/dek keys
I'm building multi-tenant solution (not in cloud) where we need to store sensitive data which should be encrypted. Some of our clients want to bring own keys (BYOK).
Each tenant has own instance of ...
4
votes
1
answer
114
views
Is there any cryptography-based assured data deletion technique currently as a standard?
I've recently read part of a book exploring secure data deletion techniques for many storage mediums. In particular, I read about assured data deletion techniques developed for data outsourced to the ...
0
votes
0
answers
33
views
Is it possible for a given plaintext and ciphertext to have two different keys? [duplicate]
This has probably been asked before but for a given ciphertext and plaintext pair, is it possible to have two different keys producing said pair? Or there are no collisions in AES, unlike hashing ...
2
votes
1
answer
78
views
Signature Chains: Ensuring Authenticity and Trust
I'm studying for an exam and came across this question:
When an electronic signature of a message claimed to be produced by
Alice is verified we typically verify (at least the first time):
that the ...
0
votes
1
answer
64
views
Is there a way to defeat statistical information leak in Vigenère cipher when the ciphertext is reasonably larger than the key size?
I read in this answer here that if the ciphertext is reasonably larger than the key size, Vigenère cipher is easily breakable.
Is there a way to repeat the key if it is reasonably smaller that the ...
2
votes
1
answer
209
views
Can we use several times the same RSA and ECC keys?
For RSA or elliptic cryptography, can we use the same public/private keys for several exchanges, or is that unsafe? Does it lower the security of the protocol?
To me it doesn't matter, as receiving ...
1
vote
0
answers
30
views
Key binding with hidden public key
In my scenario we have the Issuer I, Verifier V and Prover P.
Now the prover send some messages to I and I signs these messages with I's private key.
These messages can be easily sent from P to V and ...
0
votes
1
answer
71
views
Shared Key message-encryption multiple receiver communication
Say there are 5 parties. 1 is the sender, and 4 are the receivers.
The sender has a unique shared key with each receiver.
k1 - between sender and receiver1
k2 - between sender and receiver2
k3 - ...
0
votes
1
answer
76
views
Can a PPT adversary get secret $a$ from public messages $m_i=x_i-a \mod p-1$ for i=1,2, ...,n?
Consider I have a secret $a \in Z_P^*$ and n public messages where $m_i=x_i -a \mod p-1$ and $x_i \in Z_p$ for i=1,2, ..., n. Given that $a$ and $x_i$ for $i=1,2, ..., n$ are secrets, can a PPT ...
1
vote
1
answer
72
views
Is KangarooTwelve hash function suitable for generating very large key material as Shake-256 is?
If I take a large truly random portion of data, I know that I can generate a 2048-bits key with it (assuming the random data has more entropy than the key). I read in this forum that Shake-256 has ...