Questions tagged [symmetric]
Symmetric cryptosystems assume two communicating entities share a pre-established secret key.
129
questions with no upvoted or accepted answers
6
votes
0
answers
310
views
How to make a "zero knowledge" cache/key-value store
I'd like to use a possibly insecure cache for storing expensive-to-calculate sensitive information. My requirements are:
If the cache ever gets compromised it should reveal nothing about its ids or ...
5
votes
0
answers
152
views
Resistance to integral attacks by North Korean block cipher Jipsam1
The cipher is a modification to AES and is described on this website:
The only difference between Jipsam1 and AES-256 is the S-box. Whereas in AES the S-box is public and constant, namely
$$
\begin{...
5
votes
0
answers
198
views
Is it possible to enhance white-box cryptography security by homomorphic encryption?
Background:
Let's discussed based on published symmetric white-box crypto only, such as Chow's white-box AES.
I only know basic concepts/objectives of homomorphic encryption, such as PHE and FHE. ...
4
votes
0
answers
85
views
+50
Most simple transport encryption for link-constrained environments
What is the most simple, but yet well-known "protocol" to protect a unidirectional channel over air?
Requirements
The protocol should provide common properties like privacy, integrity and ...
4
votes
0
answers
229
views
Why are matrices so common in symmetric encryption?
Matrices have been used in symmetric ciphers since the Hill Cipher (before?) all the way up to modern ciphers such as Twofish and AES.
I understand matrices can be invertible, therefore making them ...
4
votes
0
answers
246
views
Safely using ciphers that take small key sizes
Is it feasible to use triple encryption for block ciphers with the maximum keysize being the only significant security issue? I mean $C = E_{k_1}(E_{k_2}(E_{k_3}(P)))$ and $P = D_{k_1}(D_{k_2}(D_{k_3}(...
4
votes
0
answers
147
views
Creating an SPN cipher from ChaCha20 or Salsa20's double round function
Given that ChaCha20's building blocks have been also used to construct a hash function, can the double round function from either ChaCha20 or Salsa20 be used to construct a secure SP-network cipher?
...
4
votes
0
answers
172
views
Using machine-learning techniques for data-dependent operations in ciphers
From 'Methods of Symmetric Cryptanalysis' by Dmitry Khovratovich,
The data-dependent operations are one of the most controversial design concepts. We say that an operation is data-dependent, if it ...
3
votes
0
answers
217
views
Exchanging key and input in GGM tree?
I am currently working through the exercises in A Graduate Course in Applied Cryptography by Dan Boneh. I am stuck on exercise 4.16 (page 188 in this PDF)
In the GGM tree construction for constructing ...
3
votes
0
answers
329
views
Encrypt/Cipher and Decrypt/Decipher a string with a secret
In developing an app I have a simple use case in where I want to encrypt/cipher a string (it could also be a couple of bytes because it's essentially just an IP-Address). On the output I think it ...
3
votes
1
answer
251
views
Key Encryption: Does it need to be Authenticated?
Alice wants to store files $m_i$ on Bob's untrusted cloud storage platform, with the additional restriction that she can only store one master key $k$ herself.
She encrypts the files with keys $k_i$ ...
3
votes
0
answers
171
views
Key strength comparison: symmetric key vs RSA/DH key
I came across different reputable sources quoting different equivalent symmetric key strengths for RSA/DH keys. This NIST paper (page 67) states the following offer corresponding security strenghts (...
3
votes
0
answers
281
views
Majority encryption algorithm?
Assume that I want to leave an encrypted message to a group of $n$ people in a way that they can only decrypt it if they work together in the following sense:
For some fixed $k < n$ every sub-...
3
votes
0
answers
691
views
LR-Oracle Experiment in Lindell and Katz
In reference to the LR-Oracle experiment in “Introduction to Modern Cryptography” (2nd edition) by Lindell & Katz, Definition 3.23 states a scheme $\pi = (Gen,Enc_K,Dec_K)$ is CPA secure for ...
2
votes
0
answers
46
views
Design criteria of block ciphers in quantum setting
Some design criteria of block ciphers are already known for the resistance against known attacks like differential, linear , boomerang, etc. Does there already exist any study of design criteria of ...