First  |  Prev |  Next  |  Last
Pages: 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43
Introducing dynamics into block encryptions
As I understand it, one main feature of the stream cipher RC4 is its array S, which contains a randomly ordered alphabet [0..255] that is dynamically modified via swapping of two of its elements each time a symbol is being processed. Wouldn't dynamics also be advantageous for block ciphers? One could perhaps s... 8 Mar 2010 17:33
Generic Crypto APIs ?
Carsten Krueger wrote: If it's AES, compare it with Diskcryptor 0.9 (beta) It's the fastest AES version I'm aware of. http://diskcryptor.net/index.php/DiskCryptor_en#Performance 104 MB/s @ 2.4 GHz = 23 cycles per byte Intel's AES-specific instructions (AES-NI) are 5-10 times faster. http://en.wikipe... 7 Mar 2010 04:12
Does entropy ever fall out of a good hash function?
On 7/01/2010 4:27 AM, bmearns wrote: My question is based on the concept of collecting partially-random data in a good hash function (like sha256) as a means of accumulating the random bits. For instance, if the data has an entropy rate of 0.5 Shannons per bit, we might collect 512 bits of this data into sh... 28 Feb 2010 23:22
Why shouldn't you ever reuse a stream cipher key?
I understand that using the same key all the time is a bad thing, since if that key is discovered, it would be considered a total break. However, why should you *never* reuse a stream cipher's key? ... 1 Mar 2010 11:24
Advantages of digital signatures over MACs?
Why would one use a digital signature, rather than a simple MAC? Besides being signed with an asymmetric encryption scheme, rather than a shared symmetric key, what's so different? ... 28 Feb 2010 12:13
rationale for one-way function in a key agreement scheme
Hi, I wonder what is the reason for using a one-way function in a key agreement scheme. For instance, in an ECDH scheme Alice and Bob share a secret point Z after exchanging their public keys. From Z there will be derived the symmetric secret key by a one-way function. I wonder what is the rationale behind th... 1 Mar 2010 05:53
Keyspace size of a synchronous stream cipher
I'm not sure where newbies can ask questions about cryptography, so I'm posting here. I'm just reviewing some materials and don't quit know the answer to this. If we are using a synchronous stream cipher where k is of length m bits, producing a keystream of length n bits, how large is the keyspace? ... 26 Feb 2010 20:54
using AES in the Cryptographic Message Syntax?
http://tools.ietf.org/html/rfc3370 I don't see any discussion of AES? According to the top left text, that RFC is "Updated by: 5754", but RFC5754 doesn't appear to discuss the use of AES, either. ... 26 Feb 2010 16:27
Call for Papers: The 2010 International Conference of Wireless Networks (ICWN 2010)
CFP: The 2010 International Conference of Wireless Networks (ICWN 2010) From: IAENG - International Association of Engineers http://www.iaeng.org/WCE2010/ICWN2010.html Draft Paper Submission Deadline: 6 March, 2010 Camera-Ready papers & Registration Deadline: 31 March, 2010 WCE 2010: London, U.K., 30 June -2 Ju... 26 Feb 2010 05:15
berufsunfähigkeitsversicherungen vergleichen, volksfürsorge versicherung, berufsunfähigkeitsversicherung arzt, bu versicherung vergleich, bu versicherung kündigen,
berufsunfähigkeitsversicherungen vergleichen, volksfürsorge versicherung, berufsunfähigkeitsversicherung arzt, bu versicherung vergleich, bu versicherung kündigen, + + + HAUSRAT VERSICHERUNG +++ HAUSRATVERSICHERUNG BILLIG +++ BILLIGE HAUSRATSVERSICHERUNG + http://WWW.BERUFSUNFAEHIGKEITSVERSICHERUNGEN.NL htt... 25 Feb 2010 20:30
First  |  Prev |  Next  |  Last
Pages: 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43