All Questions
Tagged with symmetric public-key
128
questions
-1
votes
0
answers
36
views
Password Manager: Sending stored passwords in API response [closed]
I am building a password manager with client-server architecture. The server will host REST APIs to manage passwords and the client (Web or Mobile) will use these APIs.
The server will store passwords ...
0
votes
1
answer
90
views
Asymmetric encryption of the AES key made available along with the ciphertext
I know there are much more sophisticated encryption schemes than this one that achieve the same goal but I would like to understand any weaknesses in this basic, and probably typical, process:
...
1
vote
1
answer
81
views
Shannon's Perfect Security for Asymmetric Encryption
I have the following definition of Shannon's Perfect Security.
Assuming messages and keys are drawn randomly from some distribution then:
The probability of guessing plaintext m is not enhanced by ...
1
vote
1
answer
71
views
Is it possible to use Diffie-Hellman protocol for symmetric group?
I was asked this question during one of my first cryptography classes, and I'm not sure if I understand it correctly. To begin, I know that after using the Diffie-Hellman protocol (which itself is ...
0
votes
0
answers
35
views
Does Qrypt's BLAST protocol based on "Doubly-Affine Extractors" use public-key or symmetric-key cryptography?
The company Qrypt states that "Key distribution based on asymmetric algorithms is a weak link for cryptography" and claims to "enable encryption without distributing encryption keys&...
1
vote
0
answers
226
views
In Symmetric encryption where Alice and Bob message each other, how can both decrypt the same data?
I first posted this question on StackOverflow but they told me it belongs here instead:
https://stackoverflow.com/questions/77856486/in-symmetric-encryption-where-alice-and-bob-message-each-other-how-...
0
votes
0
answers
44
views
Symmetric and asymmetric encryption using the same encryption/decryption algorithm?
If we use the following notation:
$$C = E(P, K_e)$$
$$P = D(C, K_d)$$
Where:
$$E(), D(), C, P, K_e, K_d$$ are the encryption algorithm, decryption algorithm, ciphertext, plaintext, encryption key and ...
6
votes
3
answers
9k
views
Can Quantum Computers crack RSA and AES?
Im trying to learn more about cryptography and ran into a post, Is AES-128 quantum safe?, which asks if AES-128 is safe. From the articles and replies it seems that AES-128 (symmetric key) is safe ...
1
vote
1
answer
329
views
Age: stream cipher with public key cryptography?
I have some rudimentary cryptography knowledge but am by no means an expert.
I generally understand stream ciphers, such as such as ChaCha20-Poly1305, to be symmetric. I am wondering how age (https://...
1
vote
0
answers
99
views
What is the most secure hybrid cipher suite(Library) possible today?
What combination of public key cryptography (DH) and symmetric key cryptography is currently available that is (subjectively) as secure as possible over other ciphers (AES,curve448) when security is ...
15
votes
6
answers
6k
views
Why do web-services tend to use preshared secret keys for client authentication instead of public keys?
Every API that I have ever signed up with gives you a secret key that you can then paste into your application. They know the key, and so do you. (The one exception may be VAPID for Web Push).
Why is ...
2
votes
2
answers
199
views
How to destroy a randomly generated key after using it?
for example, I have an encryption program like this:
Input: a message, M; my public key Kpub
Step 1: randomly generate a ...
0
votes
0
answers
41
views
Whats a practical and safe encryption to use today? [duplicate]
I'm new to making applications that encrypt sensitive data and so don't know where to start.
My question is what is a good encryption scheme that can be run in a good time for normal application and ...
0
votes
3
answers
292
views
Do we want to allow/Have we allowed parallelization (e.g GPU programming) to enter the cryptographic field? What are the consequences?
With the term GPU programming, I'm referring to highly parallelizable computing in general.
Lastly, I have built a bit of a background in cryptography. So I have started to wonder if/where GPU ...
0
votes
0
answers
42
views
Asymmetrical scheme: insecurity concerns of saving a hash of a hash of a password
please verify or explain how to do this properly.
I'm letting a user create keys from the client through a secure server.
I ask the user for a password on the client, then send the hashed password to ...