Skip to main content

All Questions

Tagged with
1 vote
1 answer
81 views

Shannon's Perfect Security for Asymmetric Encryption

I have the following definition of Shannon's Perfect Security. Assuming messages and keys are drawn randomly from some distribution then: The probability of guessing plaintext m is not enhanced by ...
revision's user avatar
6 votes
3 answers
9k views

Can Quantum Computers crack RSA and AES?

Im trying to learn more about cryptography and ran into a post, Is AES-128 quantum safe?, which asks if AES-128 is safe. From the articles and replies it seems that AES-128 (symmetric key) is safe ...
cryptoman534345's user avatar
4 votes
1 answer
611 views

Security Strength of Symmetric vs Asymmetric Ciphers

NIST SP 800-57 Part 1 rev 5 section 5.6.1.1 gives following comparison between different encryption types. For example, it shows that 3TDEA, RSA-2048, ECC224 provides security strength of 112 bits. ...
crypt's user avatar
  • 2,449
1 vote
2 answers
548 views

Is it safe to use RSA multiple times

Assuming I have multiple symmetric keys on specific machine(more than 10000 probably), can I use the same rsa key to encrypt all of those keys? I'm a bit concerned from a situation where multiple ...
user83734's user avatar
0 votes
1 answer
131 views

Choosing UWP encryption algorithms

I've just come across the large variety of encryption ciphers available in the UWP WinRT API, both symmetric and asymmetric. I'm trying to figure out which are commonly seen as the most favourable ...
dwb's user avatar
  • 101
3 votes
0 answers
171 views

Key strength comparison: symmetric key vs RSA/DH key

I came across different reputable sources quoting different equivalent symmetric key strengths for RSA/DH keys. This NIST paper (page 67) states the following offer corresponding security strenghts (...
user avatar
3 votes
1 answer
1k views

Is there a symmetric-key algorithm which we can use for creating a signature?

I know that in the asymmetric-key algorithm the RSA signature exists but what about the symmetrical ones?
Larsus's user avatar
  • 33
0 votes
1 answer
118 views

Send content to owner of gpg public key, nested content symmetric encryption

If I want to encrypt a text content file using a symmetric algorithm like AES, is there a standard format gpg will expect, where it can detect a symmetric key (encrypted with recipient gpg public key ...
MikeRoger's user avatar
  • 101
1 vote
1 answer
1k views

When is public-key crypto used / when is symmetric crypto used?

I read in the book "Cryptography & Network Security" that it has almost been universally accepted that public-key cryptography is restricted to only being used for key management (Does this mean ...
user164324's user avatar
2 votes
0 answers
298 views

Asymmetric vs symmetric encryption

I am a beginner learning about encryption and I would like to ask a few questions, hoping this is the right place to ask, so please bear with me. We have Alice and multiple clones of Bob. Only Alice ...
Ulrik's user avatar
  • 121
4 votes
1 answer
372 views

Centralized storing of private RSA key

I working on multiuser project, where users can share data. The data that users upload to the server will be encrypted before it leaves the client with a symmetric cipher, and then the symmentric key ...
BufferOverflow's user avatar
0 votes
3 answers
5k views

Diffie-Hellman "handshake" vs RSA "handshake"

I have a question about exchanging symmetric keys. I have read something about the Diffie-Hellman algorithm, where two parties generate the shared key independently, sharing only some parts of it ...
fre3zr's user avatar
  • 1
3 votes
1 answer
956 views

Preserving Confidentiality and Integrity in a Public channel

Let's say I've got two people that are trying to talk in a public channel $A$ and $B$ and they want to preserve their confidentiality and integrity. Which cryptographic algorithm would they want to ...
Jamesgr's user avatar
  • 33
0 votes
3 answers
184 views

Defining Symmetric vs Asymmetric cryptosystems

I'm writing a project on the advantages and disadvantages of symmetric vs asymmetric cryptosystems. At the moment I am trying to define both systems using mathematical notation. Under the heading "...
Charlie's user avatar
  • 11
4 votes
1 answer
2k views

Symmetric encryption using RSA for random generated password

I'm fairly new to encryption, so I wanted to check the logic for a .net solution I'm working on that encrypts data between two parties. the receiving (decrypting) party will have an RSA key pair ...
Skintreesnail's user avatar

15 30 50 per page