All Questions
19
questions
1
vote
1
answer
81
views
Shannon's Perfect Security for Asymmetric Encryption
I have the following definition of Shannon's Perfect Security.
Assuming messages and keys are drawn randomly from some distribution then:
The probability of guessing plaintext m is not enhanced by ...
6
votes
3
answers
9k
views
Can Quantum Computers crack RSA and AES?
Im trying to learn more about cryptography and ran into a post, Is AES-128 quantum safe?, which asks if AES-128 is safe. From the articles and replies it seems that AES-128 (symmetric key) is safe ...
4
votes
1
answer
611
views
Security Strength of Symmetric vs Asymmetric Ciphers
NIST SP 800-57 Part 1 rev 5 section 5.6.1.1 gives following comparison between different encryption types. For example, it shows that 3TDEA, RSA-2048, ECC224 provides security strength of 112 bits.
...
1
vote
2
answers
548
views
Is it safe to use RSA multiple times
Assuming I have multiple symmetric keys on specific machine(more than 10000 probably),
can I use the same rsa key to encrypt all of those keys?
I'm a bit concerned from a situation where multiple ...
0
votes
1
answer
131
views
Choosing UWP encryption algorithms
I've just come across the large variety of encryption ciphers available in the UWP WinRT API, both symmetric and asymmetric. I'm trying to figure out which are commonly seen as the most favourable ...
3
votes
0
answers
171
views
Key strength comparison: symmetric key vs RSA/DH key
I came across different reputable sources quoting different equivalent symmetric key strengths for RSA/DH keys. This NIST paper (page 67) states the following offer corresponding security strenghts (...
3
votes
1
answer
1k
views
Is there a symmetric-key algorithm which we can use for creating a signature?
I know that in the asymmetric-key algorithm the RSA signature exists but what about the symmetrical ones?
0
votes
1
answer
118
views
Send content to owner of gpg public key, nested content symmetric encryption
If I want to encrypt a text content file using a symmetric algorithm like AES,
is there a standard format gpg will expect, where it can detect a symmetric key (encrypted with recipient gpg public key ...
1
vote
1
answer
1k
views
When is public-key crypto used / when is symmetric crypto used?
I read in the book "Cryptography & Network Security" that it has almost been universally accepted that public-key cryptography is restricted to only being used for key management (Does this mean ...
2
votes
0
answers
298
views
Asymmetric vs symmetric encryption
I am a beginner learning about encryption and I would like to ask a few questions, hoping this is the right place to ask, so please bear with me.
We have Alice and multiple clones of Bob. Only Alice ...
4
votes
1
answer
372
views
Centralized storing of private RSA key
I working on multiuser project, where users can share data. The data that users upload to the server will be encrypted before it leaves the client with a symmetric cipher, and then the symmentric key ...
0
votes
3
answers
5k
views
Diffie-Hellman "handshake" vs RSA "handshake"
I have a question about exchanging symmetric keys. I have read something about the Diffie-Hellman algorithm, where two parties generate the shared key independently, sharing only some parts of it ...
3
votes
1
answer
956
views
Preserving Confidentiality and Integrity in a Public channel
Let's say I've got two people that are trying to talk in a public channel $A$ and $B$ and they want to preserve their confidentiality and integrity.
Which cryptographic algorithm would they want to ...
0
votes
3
answers
184
views
Defining Symmetric vs Asymmetric cryptosystems
I'm writing a project on the advantages and disadvantages of symmetric vs asymmetric cryptosystems. At the moment I am trying to define both systems using mathematical notation. Under the heading "...
4
votes
1
answer
2k
views
Symmetric encryption using RSA for random generated password
I'm fairly new to encryption, so I wanted to check the logic for a .net solution I'm working on that encrypts data between two parties. the receiving (decrypting) party will have an RSA key pair ...