<we><edit> <!-- questions and answers -->
known-plaintext-attack
gcm
attack
sha-2
password-based-encryption
cryptanalysis
integrity
modular-arithmetic
sha-256
rc4
password-hashing
provable-security
randomness
pseudo-random-generator
cryptographic-hardware
complexity
key-size
substitution-cipher
perfect-secrecy
finite-field
factoring
authentication
prime-numbers
salt
discrete-logarithm
encryption
Encryption/Decryption Modulo function
encryption
Working out what encryption/encoding is being used for these strings
encryption
hash
aes
Is there a way of converting 4 letter words in to 4 letter numbers?
encryption
Multiple private keys with RSA
encryption
rsa
public-key
Help me - I received a riddle which is too hard
encryption
hash
rsa
key-recovery
Elliptic Curve Cryptography, decrypting returns false result
encryption
elliptic-curves
Are there any benefits to using ECB over CBC?
encryption
cbc
ecb
Elliptical Curve Cryptography benchmark test
encryption
elliptic-curves
Is there an encryption algorithm that only adds minimal (if any) size compared to the size of the unencrypted data?
encryption
algorithm-design
encoding
What is the benefit of zero knowledge identification (Fiat Shamir) over a standard digital signature?
encryption
public-key
authentication
zero-knowledge-proofs
fiat-shamir
What is the difference DET-ABE Vs CP-ABE and KP-ABE?
encryption
aes
public-key
elliptic-curves
abe
What kind of ciphers does not depend on order of operation?
encryption
aes
tls
Can anyone tell me what kind of cipher this is? or how to go about solving the key?
encryption
block-cipher
prime-numbers
substitution-cipher
encoding
How to measure the security level provided by a fully homomorphic encryption library?
encryption
homomorphic-encryption
What Cipher Suite in this list is the worst to use
encryption
stream-cipher
Can an attacker predict value of $d$ if attacker already used $n$ for encryption?
encryption
rsa
cryptanalysis
Multi-round Transposition/Playfair as a secure hand cipher in the computer age
encryption
playfair
How can we encrypt a file to be just readable (and not writable) after decryption?
encryption
public-key
keys
symmetric
In Asymmetric cryptography, encryption and decryption functions are based on modulo n
encryption
rsa
Encryption to perform obfuscation
encryption
Rapid partial block decryption of compute intensive full encryption
encryption
Is there any symmetric encryption algorithm cannot guess the key when encryption and decryption value are known?
encryption
symmetric
key-recovery
Any algorithm with a pair of master keys and multiple pairs of subkey for a secure key escrow?
encryption
public-key
data-privacy
key-escrow
Any algorithm with a master key for decrypting private key encrypted messages?
encryption
public-key
data-privacy
Please Explain PRESENT-80 cipher key update
encryption
keys
implementation
present
Where is RSA applied in real life?
encryption
rsa
elliptic-curves
A question about abstract algebra
encryption
Where is RSA used today in smartphones for data protection?
encryption
rsa
public-key
symmetric
How to find modulus from a RSA public key?
encryption
rsa
public-key
keys
encoding
Looking for a specific cryptosystem (encryption two times with two different keys and then decryption with another different key )
encryption
public-key
symmetric
distributed-decryption
EL gamal cryptosystem
encryption
public-key
cryptanalysis
diffie-hellman
elgamal-encryption
How can I show Aes 512 bit is better than AES 256
encryption
aes
Decipher cryptograms encrypted with substitution cipher
encryption
cryptanalysis
Can i make a doc, docx or excel file encrypted by python?
encryption
Is using the same IV in AES similar to not using an IV in the first place?
encryption
aes
symmetric
initialization-vector
Is zero IV with AES-CBC safe if CPA is not possible and indistinguishability is not an issue?
encryption
aes
cbc
database
data-privacy
PGP Encryption and signing
encryption
signature
pgp
Proving security of AES-512 bit
encryption
aes
uniqid(mt_rand(), true);
encryption
Secure Cipher Suites supported by JDK versions
encryption
tls
Is it enough to encrypt then sign when using symmetric-key encryption?
encryption
aes
symmetric
Brute force encryption keys base on their length
encryption
keys
brute-force-attack
Generating AES-256 Private Key from user string
encryption
aes
sha-256
How do “modes of operation” with block ciphers like (eg) DES work?
encryption
block-cipher
des
modes-of-operation
How work fully homomorphic encryption to do calculations with encrypted data?
encryption
homomorphic-encryption
Non partial homomorphic encryption
encryption
homomorphic-encryption
homomorphic encryption E(x+y)=E(x) . E(y)?
encryption
homomorphic-encryption
Decrypt the encrypted message with similar symmetric key
encryption
symmetric
Why is the payload size is restricted when using RSA
encryption
rsa
pkcs1
Revealing vote after time
encryption
cryptocurrency
voting
How do I calculate a password space if the password only has eight alphabetic characters (not case sensitive)
encryption
keys
passwords
key-size
password-hashing
How do I show that the function f is not collision resistant?
encryption
hash
OAEPwithMD5andMGF1Padding in node-rsa
encryption
rsa
cryptographic function that changes with time?
encryption
What is the main difference between a key, an IV and a nonce?
keys
initialization-vector
encryption
terminology
Storing RSA private key
encryption
rsa
keys
Decryption with negligible error
encryption
Can a ciphertext be decrypted to 2 meaningful messages?
encryption
What values in the SDES algorithm change when we want to Decrypt?
encryption
block-cipher
des
Why was the Navajo code not broken by the Japanese in WWII?
encryption
cryptanalysis
classical-cipher
history
Cracking stream cipher with IV
encryption
cryptanalysis
stream-cipher
decryption-oracle
Searchable Symmetric Encryption VS Deterministic encryption?
encryption
symmetric
deterministic-encryption
searchable-encryption
Security strength for encryption and authentication (wrapping) of cryptographic keys
encryption
aes
keys
authenticated-encryption
key-wrap
AES s-box – How do I calculate the inverse of this field equation?
encryption
aes
s-boxes
cryptographic-hardware
GCM cipher M0 tables : semantic questions on how to implement GCM
encryption
gcm
Decryption of a file encrypted by pseudo-random number generator (The Linear Congruence rand()
encryption
cryptanalysis
stream-cipher
pseudo-random-generator
attack
Security Implications of Multiplication Modulo with a composite
encryption
modular-arithmetic
Establish more secure symmetric crypto system given A and B have small initial secret
encryption
diffie-hellman
symmetric
AES encryption using a Diffie-Hellman question
encryption
aes
diffie-hellman
Understanding how Oscar can decrypt a message in RSA
encryption
rsa
Can FFT be useful in encryption of dicom images?
encryption
Key strenth in Cipher cascades (Veracrypt)
encryption
aes
twofish
serpent
Constructing public key encryption schemes with desired ciphertext expansion
encryption
public-key
Decrypting message based on plain-text and encrypted text
encryption
known-plaintext-attack
Secure group chat with large groups
encryption
protocol-design
forward-secrecy
ECIES encryption output with additional parameters
encryption
elliptic-curves
ecies
Finding $d$ in RSA Encryption mathematically and by hand
encryption
rsa
modular-arithmetic
Elliptic curve representation
encryption
cryptanalysis
elliptic-curves
discrete-logarithm
Does the DES s-box only provide confusion, or does it also provide an avalanche effect?
encryption
algorithm-design
s-boxes
How cryptographically secure was the original WW2 Enigma machine, from a modern viewpoint?
encryption
cryptanalysis
history
enigma
How to express access structure ( access tree, linear secret sharing , etc.)
encryption
abe
access-control
Public Key Encryption, how do you handle not trusting the middle man?
encryption
hash
public-key
Secure Data from physical and logical Theft in a Multi User Environment
encryption
protocol-design
Multi User limited Time Encryption of big Datasets
encryption
protocol-design
Cryptanalys of "bad" RC4 implementation
encryption
cryptanalysis
key-recovery
message-recovery
Decrypting only message product - is it possible?
encryption
homomorphic-encryption
How to express access structure (access tree, linear secret sharing, etc.)
encryption
secret-sharing
abe
access-control
Symmetric Multi-Key Decryption
encryption
Understanding how to use RSA and AES in S/MIME
encryption
rsa
aes
public-key
s-mime
How to break a columnar transposition cipher?
encryption
cryptanalysis
classical-cipher
transposition-cipher
Understanding WannaCrypt's hybrid encryption scheme
encryption
rsa
aes
public-key
How to generate a ciphertext independently decodable with multiple keys?
encryption
guess keyword of a decoded code
encryption
Encryption / Decryption of PCM Audio to Tolerate Resampling
encryption
Authorizing someone to open Alice's lock when Alice's lock only has Alice's public key
encryption
public-key
authenticated-encryption
password-based-encryption
how to encrypt the chat message with multiple people public key together and restore the message?
encryption
public-key
How can SSL secure a two-way communication with only one key-pair?
encryption
tls
public-key
keys
Is multi-byte mapping to one byte a viable encryption technique?
encryption
firmware update - 34C3 CTF solution
encryption
the counter mode of encryption CTR - AES
encryption
aes