aes

  1. One way function built from AES?

  2. Can we calculate AES ciphertext length based on the length of the plaintext?
  3. AES S-Box Question

  4. How can I calculate non-linearity of an s-box element wise?
  5. Does this PBKDF2-SHA1 payload hint at a cryptographic security issue?

  6. Where can I track the time/money it would take to break common encryption
  7. Can one claim that AES is a perfect cipher?
  8. Design properties of the Rijndael finite field?

  9. Can OTP be used with RSA
  10. What are the inputs of the AES key wrap algorithm?

  11. how to obtain the plaintext in counter mode using the AES block cipher

  12. Trouble implementing AES masked sbox using composite field arithmetic

  13. Off the Record Messaging
  14. How to apply Lagrange interpolation to create AES S-box using Sage
  15. Manipulate encrypted file: AES / ECB / PKCS5Padding

  16. Multiple XML files and known-plaintext attack

  17. Is there any opensource white-box implementation of AES or DES?
  18. Revocation of users in encrypted storage system?
  19. AES: How to create the S-box with Sage
  20. Near in place encryption with BouncyCastle CCM, How large must IV and MAC be?
  21. Timing attacks against RSA, DH and AES
  22. Why should symmetric block cyphers be efficient?

  23. Why is the subhash key (H) of AES-GCM defined as such?
  24. PKCS #11 – Deriving a Key where MSB perform encryption and LSB perform CMAC operation?
  25. Message lengths with AES CTR mode?
  26. Is AES-256 consistent?

  27. Client Side Encryption custom protocol
  28. Is this MAC-then-encrypt scheme secure?

  29. Is it safe to truncate/compress SHA256?
  30. Is there any cipher standard based on SHA-3, where it is not used as part of RFC2104?

  31. AES with small and large string keys

  32. Is it possible to guess encrypted data if we have multiple ciphertexts of it?

  33. Seekable cipher, is AES CTR a good solution?
  34. Is symmetric encryption vulnerable to plain-text-attacks?
  35. XTS-AES-128 and Grover's algorithm

  36. How can we create the AES S-box using a different irreducible polynomial?
  37. How secure is AES-256?
  38. AES s-box representation
  39. Why salt can be saved in plaintext?

  40. Pseudo-random function where the output is inverted using XOR

  41. Decrypt AES key with RSA public key

  42. Do I need to generate unique IV for CBC encryption of a file if I encrypt multiple blocks of data?

  43. AES-192 bit fixed matrix values in mixed column step
  44. AES CBC mode is good for encrypting 15-20mb files and then sending it in parts?

  45. The IV for AES-128
  46. How secure is a client-side javascript encrypter?
  47. Key strenth in Cipher cascades (Veracrypt)

  48. Cut through mode for TLS AES-CBC / SHA ciphersuite

  49. What is the difference between key size and block size (for AES)?

  50. DES and AES cryptography

  51. Is it safe to store both the AES-related data and the PBKDF2-related data (except passwords) in one file?

  52. AES CBC Transfer vnitialization vector via HTTP

  53. Advanced Encryption Standard

  54. Any point to AES on password with hardcoded key?

  55. Vulnrabilites of XORing multiple random plaintexts with the same IV

  56. In a AES-CBC + HMAC architecture, Is it secure to send a second IV in a message to a device incapable of producing satisfactory random numbers?

  57. What are the relations between cryptanalysis of block ciphers such as AES and Kendall's tau coefficient?

  58. Get IV from Key, Clear and Cipher text in AES-256 CBC
  59. Does the IV need to be known by AES (CBC mode)?
  60. Is my block cipher ready for the real world if it passes all AESAVS tests?
  61. Need of Image Encryption
  62. When will AES be "upgraded"?

  63. First 16 characters replaced after decrypting AES encrypted string

  64. persisting sensitive binary data encrypted (+integrity)

  65. How to speed up AES encryption?
  66. AES-GCM: What can be done if 'H' is known by an attacker

  67. AES-GCM for Securing Bluetooth Low Energy Application

  68. AES-128. Do there exist two different keys for a pair (text, encrypted text)?
  69. Cryptographic algorithms comparison, AES vs Camellia

  70. Why should I use an Initialization Vector (IV) when I have unique keys?
  71. Given an AES-CBC encrypted string, IV, and plain text, how can I compute the key?

  72. Why is AES encryption decryption not platform agnostic?

  73. What 'exactly' are AES dual ciphers?
  74. AES: a question about dual ciphers and security
  75. rsa decrypt dll and exe then run from memory
  76. How difficult is it to crack sha256(sha256(pin)) with a 6 digit pin and no salt?
  77. What's wrong with this construction? ECDHE+AES
  78. Is AES-CTR-NoPadding resistant to variable-length chosen-plaintext attack?

  79. Attacking AES without transposition using ShiftRow and Mixcolumn layers

  80. AES S-Box implementation: from a byte-by-byte to 2-bytes-by-2bytes?

  81. Security of AES under modification of Sboxes and/or MDS mixing layer

  82. Is there a practical way to crack an AES encryption password?
  83. Permutation using cryptography instead of Fisher-Yates
  84. How were the best AES whiteboxes in the CHES 2017 CTF challenge built and broken?
  85. need to develop CSPRNG. can i use ANSI X9.31 generator

  86. Why was AES CBC removed in TLS 1.3?
  87. AES-encrypted 128-bit null block: lookup table?

  88. Security of non-standard use for AES-256-CTR?

  89. How does GRC password generator get 512 bit of secret data?

  90. AES256-GCM - can someone explain how to use it securely (ruby)
  91. How to properly apply the AES Mixcolums?

  92. Is password-based AES encryption secure at all?

  93. Does the AES Mixcolum Matrix use a fixed or random matrix?

  94. Why is AES resistant to known-plaintext attacks?

  95. Is the same message with repeated AES-GCM leaking plain text over time?

  96. Transferring Encrypted One-time pad over the internet

  97. Is this is a secure use of AES-CTR?

  98. What are the implications of a non “constant time” implementations on trusted systems in a non-network scenario?

  99. (AES in mind) How can we show two irreducible polynomials have a bit-wise linear isomorphism
  100. Storing AES encrypted RSA private keys on a server