Skip to main content

Questions tagged [cryptography]

Questions on the mathematics behind cryptography, cryptanalysis, encryption and decryption, and the making and breaking of codes and ciphers.

-2 votes
0 answers
36 views

Respected mathematicians, I would like to know if there is any GitHub repository that accurately converts SHA-family algorithms into SAT problems. So far, I found the SAT encoder by Saeed Nataj to be ...
pc gangroli's user avatar
2 votes
1 answer
32 views

In this paper: https://www.sciencedirect.com/science/article/pii/0022000079900448 Proposition 1 explains how the probability of a collection of hash functions $H$ with each $f\in H$ mapping $A$ to $B$ ...
Katharine Isabelle Bravmann's user avatar
2 votes
1 answer
67 views

Discrete logarithm is difficult because, unlike integer division where magnitudes exist, and calculation can proceed iteratively by test-comparing and subtracting, the concept of magnitude doesn't ...
DannyNiu's user avatar
  • 355
1 vote
0 answers
27 views

I am currently working my way through The Beginner’s Textbook for Fully Homomorphic Encryption by Ronny Ko. I cant wrap my head around how he grouped those terms up (p.100). If anybody could help me ...
Timwiddo's user avatar
1 vote
2 answers
138 views

I'm in the process of needing a solver for bivariate quadratic system of 2 equations over finite field - this is to estimate the time complexity of breaking an algorithm that I'm designing. Most ...
DannyNiu's user avatar
  • 355
3 votes
1 answer
96 views

The statement is, For any safe biprime $n = p \cdot q$ with $p = 2p' +1$ and $q = 2q' +1$, it holds that $\mathbb{Z}^*_n$ is isomorphic to $\mathbb{Z}_2 \times \pm QR_n$, $\pm QR_n$ being the union of ...
Kyouichi LogPose's user avatar
1 vote
0 answers
59 views

It is well known that the birthday paradox suggests that finding collisions in an n-bit hash function requires about $O(2^{n/2})$ evaluations. This heuristic underlies the common assumption that ...
Konstant's user avatar
1 vote
1 answer
54 views

Context I have a model of computation in which the only operations I can use are functions of the form $f(a, b) = g(a) \oplus h(a \oplus b)$, where $g, h : \mathbb{B}^n \rightarrow \mathbb{B}$ are ...
Lysandre Terrisse's user avatar
0 votes
0 answers
85 views

I am scratching my head with this cryptography problem but can't seem to find the attack: ...
user avatar
1 vote
1 answer
100 views

I am struggling with understanding the group structure of points on the elliptic curve Curve25519, which is widely used in cryptography. I read that the group of points $E(\mathbb{F}_p)$ on Curve25519 ...
Holle's user avatar
  • 11
0 votes
1 answer
100 views

Both of the problems in the title have a decision version which is NP-hard. My question is whether if SVP can be computed for a tractable example, can a minimum distance codeword for a related linear ...
Oisin Robinson's user avatar
7 votes
3 answers
206 views

Given finite field ${\Bbb F}_q$ and invertible and linearly independent matrices $S_1, S_2, \dots, S_m \in {\Bbb F}_q^{n \times n}$, if one samples $k_1, \dots, k_m \in {\Bbb F}_q$ uniformly, is there ...
user2249675's user avatar
  • 1,220
1 vote
1 answer
30 views

I am reading the paper entitled "Identity-Based Distributed Provable Data Possession in Multicloud Storage". On page 10, it gives a security analysis of the proposed protocol using proof by ...
bettersayhello's user avatar
0 votes
0 answers
21 views

NOTE: I am cross posting between math stack exchange and crypto stack exchange. I am not sure who would be more appropriate to ask. I’m working on an educational resource that discusses Feldman’s ...
Joe's user avatar
  • 3,051
2 votes
0 answers
82 views

I recently came across this thesis, where the author discusses, on pages 42–45, how probability can be used to decipher ciphers like the Caesar cipher using Bayes' theorem. While I am familiar with ...
Louis's user avatar
  • 161

15 30 50 per page
1
2 3 4 5
130