Skip to main content

All Questions

Tagged with
1 vote
0 answers
41 views

In Kerberos, is the "Authentication Server" the only "Trusted Third Party"? Or is "Ticket Granting Server" also a "Trusted Third Party"? [closed]

I know that AS (Authentication Server) is a TTP (Trusted Third Party) because it generates keys for two entities (for the client and the TGS). But what about TGS (Ticket Granting Server)? It also ...
allexj's user avatar
  • 51
0 votes
0 answers
35 views

Does Qrypt's BLAST protocol based on "Doubly-Affine Extractors" use public-key or symmetric-key cryptography?

The company Qrypt states that "Key distribution based on asymmetric algorithms is a weak link for cryptography" and claims to "enable encryption without distributing encryption keys&...
Very Tiny Brain's user avatar
1 vote
0 answers
59 views

Linux Kernel CryptoAPI key exchange and key derivation

I have a custom network and I want to implement a symmetric key exchange and key derivation mechanism with ECDH. I know that I need to use KPP API and ECDH helper functions, but I can't find any code ...
Ham's user avatar
  • 11
1 vote
0 answers
99 views

What is the most secure hybrid cipher suite(Library) possible today?

What combination of public key cryptography (DH) and symmetric key cryptography is currently available that is (subjectively) as secure as possible over other ciphers (AES,curve448) when security is ...
nitchan's user avatar
  • 147
1 vote
1 answer
527 views

Sending encrypted message without public key from recipient (elgamal)

assume Bob and Alice use Elgamal encryption scheme. Alice wants to send Bob a message, but does not know Bobs public key. Is there a way for Alice to find out Bobs public key by receiving multiple ...
Reideler's user avatar
2 votes
1 answer
319 views

If the symmetric key is stolen; can I key revoke without reencrypted data?

I have a question about database security. This is a scenario I have. The data is encrypted using symmetric (i.e., AES) and stored in a database, while the secret key is stored on the client side, so ...
Maryam's user avatar
  • 21
3 votes
3 answers
1k views

How to interpret my professor's statement about "seed" and "symmetric-key encryption"?

In the cryptography course, the professor said that: these days for symmetric key encryption, instead of sending out the key, Alice sends the seed to Bob, and then based on that Bob can get the key. ...
Hedeesa's user avatar
  • 43
1 vote
1 answer
40 views

How to calculate a common encryption key between sender and receiver

In the picture below, for the text underlined in red color: 7X(MOD 11) = 72(MOD 11) =49(MOD 11) My questions are: (1) obviously there is no equal relationship between 72(MOD 11) and 49 (MOD 11), and ...
common2k's user avatar
1 vote
1 answer
134 views

Is there any standard present to measure strength of a generated key using true random number generator?

I was wondering how to measure the security strength of a generated secret key for the below protocol: "A 128 bit random number is generated by TRNG and the random number will be used as a ...
Sami's user avatar
  • 37
0 votes
0 answers
171 views

Key storage management of session keys and long term keys

In key management, one of the topics is key storage, I want to know where and how these keys(long-term and short-term) are stored? For example I read that android password apps use KeyStore api to ...
Bnjmn's user avatar
  • 1
0 votes
1 answer
79 views

Symmetric Exchange Key Sharing

Question: Suppose that there are 10000 = 10^4 banks and 10 payment card organisations (PCOs). How many secret keys will be needed if each PCO shares a unique secret key with each bank? How many extra ...
Riz's user avatar
  • 1
3 votes
1 answer
495 views

Can Key-Encryption Key (KEK) be symmetric?

This from Cryptography course from Coursera: Key wrapping or encapsulation using a KEK can be accomplished using either symmetric or asymmetric cipher For my information KEK solves the key ...
mshwf's user avatar
  • 141
2 votes
1 answer
2k views

How to generate the exact AES key in both client and server side?

I am using AES to create a secure tunnel for transmission of data. As the symmetric key encryption will require the same key to encrypt and decrypt, so we need to generate the exact same key for the ...
zebiskin's user avatar
1 vote
0 answers
38 views

Server distributing/sharing a symmetric key to one or more clients via an established secure connection?

I have a server and a client device that share two separate data channels that each need to have authentication and encryption protections. When a connection is made over data channel 1, it is secured ...
nikegolf05's user avatar
0 votes
0 answers
32 views

Are there any known problems performing a One-time pad with 2 keys stored separately - AKA 2 part Symmetric key exchange over TLS

If this is something that already has a name, please tell me to look at that, but I have not been able to find one yet. I am considering this process for storing some data securely. I want to ...
Matthew Carlson's user avatar

15 30 50 per page