<we><edit> <!-- questions and answers -->
modular-arithmetic
keys
ctr
performance
password-based-encryption
collision-resistance
one-time-pad
post-quantum-cryptography
salt
hash
symmetric
side-channel-attack
file-encryption
certificates
entropy
substitution-cipher
protocol-design
pseudo-random-generator
tls
group-theory
block-cipher
authentication
aes
mac
terminology
cryptanalysis
Is squaring equivalent to shifting in the normal basis representation of an extension field over the prime field?
encryption
cryptanalysis
elliptic-curves
post-quantum-cryptography
How can we add real values using GF field?
encryption
cryptanalysis
random-number-generator
homomorphic-encryption
How to break a columnar transposition cipher?
encryption
cryptanalysis
classical-cipher
transposition-cipher
Attacking a cipher, not knowing what the plaintext should look like – how do you know you’ve successfully decrypted the ciphertext?
encryption
cryptanalysis
What are the Evaluation Meassures of Public key cryptography algorithm
encryption
rsa
public-key
cryptanalysis
algorithm-design
Is it possible to attack an SHA-256 hash seeded with PHP’s mt_rand function?
cryptanalysis
algorithm-design
random-number-generator
implementation
sha-256
How to decode a caesar that goes to transposed plaintext?
cryptanalysis
classical-cipher
substitution-cipher
vigenere
Proof that this is not a secure pseudorandom function?
cryptanalysis
algorithm-design
pseudo-random-function
How can I calculate non-linearity of an s-box element wise?
encryption
aes
cryptanalysis
authenticated-encryption
statistical-test
Is it right that the Bomba can halt, but give you a different settings other than the one Germans really used for encryption using an Enigma?
cryptanalysis
enigma
Is it possible to assume that the adversary is not allowed to make an all zero plaintext query in IND-CPA?
encryption
cryptanalysis
chosen-plaintext-attack
semantic-security
Is there a quick way to know the length of a message hashed using SHA3?
hash
cryptanalysis
implementation
sha-1
sha-3
Recommendations for a book explaining most of the modern algorithms?
cryptanalysis
Is it possible to actually verify a “sponge function” security claim?
hash
cryptanalysis
collision-resistance
sha-3
sponge
Analysis of Repeatedly Enciphered Plaintext using Same Algorithm / Key?
cryptanalysis
Risks of full length KCV (components and full keys)?
cryptanalysis
keys
attack
key-check-value
how to calculate the non linearity of each element of s box?
cryptanalysis
What if we increase the key length of DES and use ECB Mode, then will we get the different output as ECB mode encrypt with the same key?
encryption
cryptanalysis
block-cipher
des
ecb
Cryptanalysis on block cipher (What is exactly a zero correlation attack?)
cryptanalysis
block-cipher
algorithm-design
linear-cryptanalysis
how to implement non linearity criterea on s box to find non linearity of tha s plz explain .p
cryptanalysis
Should the identity of a sender be verified using additional means, or does a MAC suffice?
encryption
cryptanalysis
authentication
mac
integrity
Why can an arbitrary compression function mapping $\{0,1\}^{m+2^m} \rightarrow \{0,1\}^m$ not seriously be considered collision resistant?
cryptanalysis
algorithm-design
collision-resistance
compression
merkle-damgaard
Jumblar: Using map locations as passwords
cryptanalysis
passwords
Stuck on an affine cipher exercise
cryptanalysis
affine-cipher
Security of additive symmetric homomorphic encryption scheme with linear operations?
encryption
cryptanalysis
homomorphic-encryption
chosen-plaintext-attack
Semantic security IND-CPA of Affine Hill Cipher
encryption
cryptanalysis
homomorphic-encryption
chosen-plaintext-attack
Known Plaintext Attack A5/2
cryptanalysis
stream-cipher
known-plaintext-attack
linear-cryptanalysis
Why should the factors $p,q$ of $n$ be half the bit length of $n$ in RSA?
encryption
rsa
public-key
cryptanalysis
key-size
How is a "SHA256 reduced by X of Y rounds" built?
hash
sha-256
cryptanalysis
Can you help me understand Pollard's rho example?
cryptanalysis
attack
algorithm
pollard-rho
What rule(s) for a good S-box is this one violating and how does it relate to non-linearity etc.?
cryptanalysis
s-boxes
RSA Calculating the size of the plaintext given two primes p and q
rsa
cryptanalysis
Quantative criteria to measure confusion and diffusion property of encryption algorithm
encryption
cryptanalysis
How can I identify the linear equations for a block cipher with 4 different s-boxes?
cryptanalysis
block-cipher
linear-cryptanalysis
What are the relations between cryptanalysis of block ciphers such as AES and Kendall's tau coefficient?
aes
cryptanalysis
block-cipher
nsa
Why the permutation of the right hand rotor given in Rejewski's paper is $PNP^{-1}$?
cryptanalysis
enigma
Break simplified DES
encryption
cryptanalysis
des
XORing to detect decrypted value?
cryptanalysis
xor
Can/Which encryption algorithms be daisy chained to create a cryptographic computational puzzle?
encryption
cryptanalysis
proof-of-work
Why was the Navajo code not broken by the Japanese in WWII?
encryption
cryptanalysis
classical-cipher
history
Homogenous vs heterogeneous unbalanced Feistel networks?
encryption
cryptanalysis
algorithm-design
symmetric
feistel-network
Applicability of IBM's projected 50-qubit quantum computer Q to cryptanalysis?
cryptanalysis
quantum-cryptography
AES: a question about dual ciphers and security
aes
cryptanalysis
algorithm-design
side-channel-attack
Kerckhoffs’ principles – Why should I make my cipher public?
cryptanalysis
protocol-design
algorithm-design
terminology
List of security protocols that have been proved to have bugs using formal methods
cryptanalysis
protocol-analysis
how long does the cycle length have to be in stream ciphers?
cryptanalysis
stream-cipher
Why do elliptic curves require fewer bits for the same security level?
cryptanalysis
elliptic-curves
diffie-hellman
group-theory
Finding Small Roots of Multivariate Polynomial Modulo an Integer in Sage (Coppersmith's Attack on RSA)
rsa
cryptanalysis
Deciphering the RSA encrypted message from three different public keys
encryption
rsa
cryptanalysis
Known plaintext attack against Feistel ciphers
cryptanalysis
known-plaintext-attack
feistel-network
Parallel Pollard's Rho: Number of distinguished points
cryptanalysis
discrete-logarithm
Increasing rounds in DES, increases or decreases the security?
encryption
cryptanalysis
symmetric
des
Are there any long term RC4 bias based exploits?
cryptanalysis
reference-request
attack
rc4
How to encrypt data and know it will be secure for at least a few decades?
encryption
cryptanalysis
brute-force-attack
Including the next random One Time Pad as part of the encoded message?
cryptanalysis
keys
one-time-pad
While encrypting what can happen between words
cryptanalysis
known-plaintext-attack
pen-and-paper
What are the implications of a non “constant time” implementations on trusted systems in a non-network scenario?
aes
cryptanalysis
attack
timing-attack
Cracking a key using a combination of partial keys
cryptanalysis
block-cipher
keys
entropy
side-channel-attack
Why in the Rao-Nam private key version of McEliece scheme, P matrix is multiplied after adding error vector?
encryption
cryptanalysis
post-quantum-cryptography
mceliece
What does the "Type 1 query" model on Miles, Sahai, and Zhandry's paper?
public-key
cryptanalysis
provable-security
semantic-security
How can we prove that the scrambled G matrix in McEliece cryptosystem preserves the minimum distance properties of G matrix?
encryption
public-key
cryptanalysis
post-quantum-cryptography
mceliece
Will properties of original G matrix be satisfied in the scrambled G (SGP) matrix in McEliece cryptosystem?
cryptanalysis
homomorphic-encryption
post-quantum-cryptography
mceliece
Exercise: recognizing Hawaiian plaintext
cryptanalysis
brute-force-attack
unicity-distance
What are recommended, general strategies to start block-cipher design and/or analysis?
cryptanalysis
block-cipher
algorithm-design
Pseudorandom vs quasi-random
encryption
cryptanalysis
Difference between the ACM cipher and Vigenere Cipher
cryptanalysis
vigenere
How to determine the next number from java's Random method
cryptanalysis
random-number-generator
How is it possible for someone to "Protect against Future Unknown Attacks"
cryptanalysis
Decrypting AES with known properties of plaintext
cryptanalysis
known-plaintext-attack
Determining a cryptographic algorithm by description
cryptanalysis
Components of Cryptanalysis
encryption
cryptanalysis
terminology
Classify a (block) cipher
cryptanalysis
block-cipher
transposition-cipher
spn
If a cipher is not in ECB mode, how is it possible to apply differential cryptanalysis?
cryptanalysis
symmetric
ecb
Attack on Cipher with Highly Related RoundKeys
aes
cryptanalysis
key-schedule
Does a practical collision attack on a cryptographic hash function also mean it fails “indistinguishable from random data”?
hash
cryptanalysis
collision-resistance
randomness
sha-1
Affine Cipher Cryptanalysis
cryptanalysis
affine-cipher
what is scyther code for this protocol?
cryptanalysis
attack
protocol-analysis
How Far Ahead of Academia Are Government Agencies?
encryption
cryptanalysis
nsa
Incremental RC4 algorithm?
cryptanalysis
rc4
Where is HChaCha20 formally defined?
hash
cryptanalysis
reference-request
chacha
hchacha20
Which precautions to protect against side-channel attacks on ARX ciphers?
encryption
cryptanalysis
algorithm-design
side-channel-attack
arx
Why can't I reverse a hash to a possible input?
hash
cryptanalysis
preimage-resistance
truncated linear congruential generator
cryptanalysis
lattice-crypto
Space complexity of quantum collision search?
cryptanalysis
collision-resistance
reference-request
post-quantum-cryptography
Is 80 bits of key size considered safe against brute force attacks?
cryptanalysis
brute-force-attack
Shake 128/256 Output Length Restrictions
cryptanalysis
sha-3
keccak
Knowing interval of discrete log for elliptic curve
cryptanalysis
elliptic-curves
discrete-logarithm
Is $a b + e \mod P$ hard to invert?
cryptanalysis
algorithm-design
hardness-assumptions
Affine cipher : Why it is required to have GCD(a, m) equals to 1
encryption
cryptanalysis
affine-cipher
Does adding more characters to the Enigma rotors improve crypto strength?
cryptanalysis
classical-cipher
substitution-cipher
enigma
Fuzzy Extractor constructor for sequence reconciliation
cryptanalysis
randomness
information-theory
What are the exceptions to Kerckhoffs's principle?
cryptanalysis
security-definition
Correlation between prop ratio and numbers of pairs needed
cryptanalysis
differential-analysis
Can a MITM attack be applied to this construction?
cryptanalysis
multiple-encryption
meet-in-the-middle-attack
How to make Difference Distribution Table
cryptanalysis
differential-analysis
Cracking affine cipher with plaintext
cryptanalysis
affine-cipher
Is python a secure programming language for cryptography?
cryptanalysis
encryption
A good introduction to Cryptography
encryption
cryptanalysis
Reversing this Rotation + Xor Decryption
encryption
cryptanalysis
Is quantum cryptography unbreakable?
encryption
cryptanalysis
quantum-cryptography