Skip to main content

All Questions

Tagged with
-1 votes
0 answers
36 views

Password Manager: Sending stored passwords in API response [closed]

I am building a password manager with client-server architecture. The server will host REST APIs to manage passwords and the client (Web or Mobile) will use these APIs. The server will store passwords ...
Hem Bhagat's user avatar
0 votes
1 answer
90 views

Asymmetric encryption of the AES key made available along with the ciphertext

I know there are much more sophisticated encryption schemes than this one that achieve the same goal but I would like to understand any weaknesses in this basic, and probably typical, process: ...
blockmined's user avatar
1 vote
1 answer
81 views

Shannon's Perfect Security for Asymmetric Encryption

I have the following definition of Shannon's Perfect Security. Assuming messages and keys are drawn randomly from some distribution then: The probability of guessing plaintext m is not enhanced by ...
revision's user avatar
1 vote
1 answer
71 views

Is it possible to use Diffie-Hellman protocol for symmetric group?

I was asked this question during one of my first cryptography classes, and I'm not sure if I understand it correctly. To begin, I know that after using the Diffie-Hellman protocol (which itself is ...
karolajoj_PL's user avatar
0 votes
0 answers
35 views

Does Qrypt's BLAST protocol based on "Doubly-Affine Extractors" use public-key or symmetric-key cryptography?

The company Qrypt states that "Key distribution based on asymmetric algorithms is a weak link for cryptography" and claims to "enable encryption without distributing encryption keys&...
Very Tiny Brain's user avatar
1 vote
0 answers
226 views

In Symmetric encryption where Alice and Bob message each other, how can both decrypt the same data?

I first posted this question on StackOverflow but they told me it belongs here instead: https://stackoverflow.com/questions/77856486/in-symmetric-encryption-where-alice-and-bob-message-each-other-how-...
sudoExclamationExclamation's user avatar
0 votes
0 answers
44 views

Symmetric and asymmetric encryption using the same encryption/decryption algorithm?

If we use the following notation: $$C = E(P, K_e)$$ $$P = D(C, K_d)$$ Where: $$E(), D(), C, P, K_e, K_d$$ are the encryption algorithm, decryption algorithm, ciphertext, plaintext, encryption key and ...
ESCM's user avatar
  • 101
6 votes
3 answers
9k views

Can Quantum Computers crack RSA and AES?

Im trying to learn more about cryptography and ran into a post, Is AES-128 quantum safe?, which asks if AES-128 is safe. From the articles and replies it seems that AES-128 (symmetric key) is safe ...
cryptoman534345's user avatar
1 vote
1 answer
329 views

Age: stream cipher with public key cryptography?

I have some rudimentary cryptography knowledge but am by no means an expert. I generally understand stream ciphers, such as such as ChaCha20-Poly1305, to be symmetric. I am wondering how age (https://...
incisor_supervisor's user avatar
1 vote
0 answers
99 views

What is the most secure hybrid cipher suite(Library) possible today?

What combination of public key cryptography (DH) and symmetric key cryptography is currently available that is (subjectively) as secure as possible over other ciphers (AES,curve448) when security is ...
nitchan's user avatar
  • 147
15 votes
6 answers
6k views

Why do web-services tend to use preshared secret keys for client authentication instead of public keys?

Every API that I have ever signed up with gives you a secret key that you can then paste into your application. They know the key, and so do you. (The one exception may be VAPID for Web Push). Why is ...
Gregory Magarshak's user avatar
2 votes
2 answers
199 views

How to destroy a randomly generated key after using it?

for example, I have an encryption program like this: Input: a message, M; my public key Kpub Step 1: randomly generate a ...
Leo's user avatar
  • 99
0 votes
0 answers
41 views

Whats a practical and safe encryption to use today? [duplicate]

I'm new to making applications that encrypt sensitive data and so don't know where to start. My question is what is a good encryption scheme that can be run in a good time for normal application and ...
KryptoKing's user avatar
0 votes
3 answers
292 views

Do we want to allow/Have we allowed parallelization (e.g GPU programming) to enter the cryptographic field? What are the consequences?

With the term GPU programming, I'm referring to highly parallelizable computing in general. Lastly, I have built a bit of a background in cryptography. So I have started to wonder if/where GPU ...
tur11ng's user avatar
  • 962
0 votes
0 answers
42 views

Asymmetrical scheme: insecurity concerns of saving a hash of a hash of a password

please verify or explain how to do this properly. I'm letting a user create keys from the client through a secure server. I ask the user for a password on the client, then send the hashed password to ...
irth's user avatar
  • 109

15 30 50 per page
1
2 3 4 5
9