Skip to main content

Questions tagged [cryptography]

A puzzle concerning techniques for secure communication in the presence of (hostile) third parties. Do NOT use this for simple "crack the code" problems; use [cipher] instead.

2 votes
1 answer
162 views

How can eight quants learn their average salary without revealing individual salaries? [closed]

Here is a problem from section 2.3 (Thinking Out of the Box) section of the popular book by Xinfeg Zhou titled 'Quant salary': Quant Salary Eight quants from different banks are getting together for ...
kaddy's user avatar
  • 21
1 vote
1 answer
202 views

Two Sheriffs and Eavesdroppers - 3

“The Two Sheriffs” puzzle was already discussed here. This puzzle has only one difference: we have six suspects instead of eight. Two sheriffs in neighboring towns are on the track of a killer, in a ...
mathlander's user avatar
  • 1,261
1 vote
3 answers
180 views

Scheme to select a multiple choice answer on a whiteboard secretly? [closed]

Trying to set up a cute demonstration of cryptography, here's what I'm envisioning so far: I have a whiteboard, some number of students, and an equal number of different colored markers. On the ...
LionLoin's user avatar
17 votes
17 answers
2k views

The dessert problem (blind ballot remaining blind if non-unanimous) [closed]

A group of (possibly over-polite) people have just finished their meal at a restaurant. One of them asks, "Does anyone want dessert?" The table goes quiet. Some of the people might want ...
Mark Green's user avatar
9 votes
3 answers
594 views

Judgment-free construction of a playlist

Alice and Bob are planning a long car trip and need to come up with a playlist for it. For any given song, they have one of four opinions on it: "That's, like, my favorite song ever" (love), ...
Joseph Sible-Reinstate Monica's user avatar
-1 votes
1 answer
80 views

intercepting the box [duplicate]

If you need to send a message in a box to a person so that no one can intercept it and get the message, how do you do so if you have a padlock and key and they have a padlock and key
this_is_a_banana's user avatar
-1 votes
2 answers
198 views

Really Secure Awesome Cryptography

Really Secure Awesome Cryptography is a protocol for sending messages based on public-key cryptography. Assume that messages are simple text strings of at most 500 characters. Users choose a private ...
happystar's user avatar
  • 7,770
13 votes
12 answers
2k views

2 Person Same Number Verification

Alice and Beth both receive a random integer from 1 through 10, inclusive. They only know the number that they are given. The two of them want to come up with an algorithm to check that their ...
Nahmid's user avatar
  • 608
7 votes
6 answers
565 views

Flipping a coin across the internet

Suppose you wish to "flip a coin across the internet". ie. You want to show other people that you've flipped just ONE coin, and show them the result. I'm currently trying to think of the simplest ...
Shuri2060's user avatar
  • 3,068
6 votes
1 answer
465 views

Hack of the International Stamped Time Server

The International Stamped Time Server (ISTS) broadcasts a time stamp integrity-protected with an RSA-4096 public key $(n,e)$. But mere days after it starts operation, hackers announce they pwned it by ...
fgrieu's user avatar
  • 383
18 votes
7 answers
2k views

Cracking Nested One-time Pads

Inspired by the famous "how to send a locked box without pre-shared keys" puzzle, I have designed a Truly Clever and Very Secure cryptographic protocol for situations where you must send a secret ...
Bass's user avatar
  • 77.9k
50 votes
12 answers
11k views

Challenge for lovers

One of my friends gave me this puzzle. Please help me find the answer for it. Jane and Mike have fallen in love, and Mike wishes to send her a ring via mail. Unfortunately they live in Kleptopia ...
Supriya S's user avatar
  • 319
0 votes
2 answers
430 views

How can our secret agent produce a cryptographically secure random number?

Secret Agent Michael Scarn enters his hotel room, only to find it having been ransacked. He needs to send an encrypted message to his handler notifying them that his cover has been compromised. In ...
IQAndreas's user avatar
  • 714
12 votes
3 answers
2k views

Overhead Projector Cryptography

Back in the day, if you wanted to show an image to a large audience, you would use an overhead projector. This would shine a light through a transparency, which is a clear sheet with a black drawing ...
Mike Earnest's user avatar
  • 32.5k
10 votes
3 answers
903 views

Two Sheriffs and Eavesdroppers - 2

“The Two Sheriffs” puzzle was already discussed here Two Sheriffs and Eavesdroppers. This puzzle has only one difference: we have seven suspects instead of eight. Two sheriffs in neighboring towns ...
Alexey Ustinov's user avatar

15 30 50 per page