Skip to main content

All Questions

0 votes
2 answers
125 views

Multiple IV CBC

CBC's encryption is not paralelizable but I could divide a 64 block message in 4 16 block parts and encrypt those 4 parts separatly in parallel using a diferent IV for each one. Is this unsecure ? Is ...
moutonlapin28's user avatar
0 votes
0 answers
234 views

Another cut-and-paste attack on CBC mode

I am trying to see specific cases of attacks in the CBC mode, in particular, I am investigating some attacks such as Example of a cut-and-paste attack on CBC. Here I have posted something similar and ...
user424241's user avatar
0 votes
0 answers
151 views

AES encryption question

If we consider the generation of keys as $$\begin{aligned} K_0 &= E_K(IV); \\ K_{i+1} &= E_{K_i}(A) \end{aligned}$$ Where A is a block of zeroes, and the ciphertext blocks are computed as ...
le19's user avatar
  • 1
0 votes
1 answer
326 views

Is this method of speeding up a symmetrical algorithm secure? (AES output joining)

I was trying to find out a way of speeding up a given symmetrical algorithm the reason and programing launguage in this case are unimportant. I have came up with the following thing: Divide data into ...
nate2463's user avatar
3 votes
1 answer
256 views

Why does the Gameboy Advance serial encryption include the destination byte address?

The Gameboy Advance encrypts data sent over its serial port. It assembles a random number to seed a linear congruential generator. Then, it xors this PRN, the data, a symmetric key, and the byte ...
Brian Graham's user avatar
2 votes
3 answers
295 views

Are there any deterministic multi-block encryption constructions that have an avalanche effect going both ways?

For common multi-block encryption schemes (CBC, CTR, CFB, stream ciphers, etc), if they are forced to be deterministic, a change in the plaintext will change only the current block and maybe future ...
Daffy's user avatar
  • 2,419
8 votes
1 answer
173 views

Is the risk of a collision for OCB mode mitigated by upping the block size of the cipher?

A paper published by Niels Furguson Collision attacks on OCB indicates that processing large amounts of data (somewhere on the order of $2^{32}$ 128-bit blocks) with a single encryption operation (...
K3rb3ros's user avatar
  • 143
1 vote
1 answer
658 views

Is this symmetric key MAC-then-encrypt auth token methodology secure?

NOTE: This question originally conflated a "digital signature" and a "MAC", which I've since learned are not the same thing. Any references (in the answer or any comments) to a "signature" should be ...
AJB's user avatar
  • 121
1 vote
2 answers
775 views

How effective is Serpent-256 in CTR mode?

I downloaded a compression program known as PeaZip which offers encryption and 2-way authentication also. PeaZip has an option to encrypt compressed file with variety of ciphers and one of them is ...
RPK's user avatar
  • 571
5 votes
2 answers
885 views

How secure would hand ciphers be using a Block Cipher Mode?

I've been looking into different ciphers that require very minimal computation power (calculator, deck of cards, index cards and a pencil), i.e. hand ciphers. For the most part all methods typically ...
jecxjo's user avatar
  • 161
5 votes
2 answers
3k views

Secure method for encrypting 32 byte private keys

I am using 32 byte EC private keys on the client side of a web application. These keys should be securely stored on a server database. The keys should be encrypted (AES) before being sent to the ...
Matthew Mitchell's user avatar
2 votes
2 answers
3k views

IV/Nonce in CTR&GCM mode of operation

We know reusing IV can compromise our secrecy. I have some questions aiming to clarify the use of an IV/Nonce in CTR/GCM: Is it OK to use the same key for encrypting plain-texts in authenticated ...
user12036's user avatar
12 votes
4 answers
4k views

What is the difference between a 'cipher' and a 'mode of operation'?

What is the difference between the term cipher (a name like RIJNDAEL) and mode of operation (like ECB)? Aren't these both terms for the encryption/decryption technique?
hsuk's user avatar
  • 229
3 votes
1 answer
334 views

Camellia cipher - is it a symmetric or asymmetric cipher?

I read a wiki page about Camellia cipher and know that it is a block cipher that can use 128-bit, 192-bit or 256-bit keys. But I cant find any information about if its a symmetric cipher (uses one key ...
ivy's user avatar
  • 141
4 votes
0 answers
1k views

Symmetric encryption mode where ciphertext size is plain text size [duplicate]

I've had many questions on Stackoverflow on how to minimize the output of a cipher - during encryption of course - to the same size as the input. Obviously this is possible for a single block of ...
Maarten Bodewes's user avatar
  • 93.4k

15 30 50 per page