Cryptography is the practice and study of logical means used to achieve information confidentiality, integrity and authenticity. It covers, among other things, encryption (making some data unreadable except for those who know a given secret element, called a key), data hashing (in particular for ...

learn more… | top users | synonyms

2
votes
2answers
91 views

Explain real world symmetric key encryption

I'm new to cryptography. While reading about symmetric key encryption, it was mentioned that it requires secret key exchange so that 2 parties can decrypt the ciphertext. Now, using some encryption ...
0
votes
3answers
97 views

Protecting data through an XOR operation with sufficiently long keys

Suppose two parties S and D would like to protect a communication channel. Therefore, S and D exchange two sufficiently long key sequences SB und DB of random bits over a secure channel [e.g not over ...
-4
votes
0answers
38 views

Phd student proposal for security in clouds [on hold]

I am planing to do a phd in " clouds computing security" and I need some interesting points to mention in my proposal
5
votes
1answer
1k views

Consequences of tampered /etc/ssh/moduli

What are the consequences if an attacker is able to modify the /etc/ssh/moduli file?
0
votes
1answer
22 views

Does DUKPT support offline mode?

I have been working on the payment side with RSA and AES encryption which I got a fairly well technical understanding of encrypting credit card details. Recently, We adopted a new chip and pin device ...
12
votes
4answers
519 views

Why is Bruce Schneier recommending symmetric crypto over public key crypto

I just read the article written by Bruce Schneier, the crypto guru. In the article, he says : Prefer symmetric cryptography over public-key cryptography. But, he doesn't shed any light as to ...
3
votes
1answer
93 views

Properly implemented strong crypto systems [on hold]

I have read this article about the revelation that in 2010 major encryption mechanisms including big four (hotmail, facebook, google, yahoo) and other encryption mechanisms were broken by NSA and ...
50
votes
3answers
2k views

Did US and UK spy agencies defeat privacy and security on the internet?

This question is meant as a canonical question in regard to the US and UK spy agencies compromising end nodes and encryption between nodes to spy on people they suspect to be terrorists. However, this ...
-4
votes
0answers
24 views

question about discrete logarithm? [on hold]

hiii, I have one question about the calculate of x=g^y Mod p where : y is bigger than P is this function correct ? thank you
3
votes
1answer
90 views

Hashing passwords before inserting into database

For the last 2 weeks I have been reading many blogs about website security and hashing passwords. Many sites have mentioned the pro's and cons about different ways of doing this, which has left me a ...
8
votes
2answers
195 views

How do new security and cryptography techniques/protocols avoid the chicken-and-egg problem?

. . .better solutions have been proposed and will be worth considering once they have withstood the test of time (i.e. “5 to 10 years in the field, and not broken yet”). -From Thomas Pornin's ...
8
votes
3answers
156 views

What was SSL 1.0?

What was SSL 1.0? SSL 2.0 and 3.0 are well-known and well-documented. But what did the SSL 1.0 protocol look like? Wikipedia says there was a SSL 1.0 but doesn't say anything about how it worked. ...
0
votes
1answer
22 views

Encrypted data transfer with middle node and asymmetric key

I'm looking forward to pass data from a node A to a node B using asymmetric cryptography, but with one (huge) constraint: When A sends data to B, it is possible that B is offline. I would like to be ...
0
votes
0answers
13 views

Finite fields and ECC [migrated]

I understand modular arithmetic(or at least I think I do!) and I've tried to read and learn about how the Math in RSA works(and I think it went pretty well). I've been reading up on ECC and it looks ...
5
votes
0answers
31 views

Diffie-Hellman: choosing wrong generator “g” parameter and its implications of practical attacks [migrated]

In traditional DH one chooses two shared parameters: a large prime "p" and base "g", which is primitive root mod "p". Suppose generation algorithm is broken and "g" generates only a subgroup (group ...

15 30 50 per page