First  |  Prev |  Next  |  Last
Pages: 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
Is this construct a MAC ?
Hi, I have a message M, a hash function H(), and a block cipher with encryption function E() and decryption function D() I calculate S=E(K, H(M)) (encrypt the hash of message with a key K) 1) Can this construct of S be called a mac of the message ? 2) Is it a good one ? I guess one could argue that this... 11 May 2010 04:37
Diffie-Hellman key exchange
Hi, let the one-way function be (a ^ b) mod m. What are typical ranges for a, b and m? I guess a can be small ( 10^1 ?) since (a ^ b) becomes rather large very quickly. TIA Steven ... 14 May 2010 07:20
What do I need to know to design a cryptosystem?
On Mar 13, 9:07 am, cplxphil <cplxp...(a)gmail.com> wrote: Hi all, I recently became interested in trying, in my spare time, to develop a cryptosystem.  I have some math/CS training, and a degree in mathematics.  What do I need to know to design a cryptosystem?  What steps are involved?  I would assume ... 10 May 2010 22:07
Decryption string
how to decrypt this string? <~6tC.HG(a)X07G:tIBGBe=&F>6fj6nhYRG(a)X0@6t.ZBGBdt"F>6 fj6o0%!G(a)X0@G@E'uGBdsqF 6fj6tCRTG(a)X07G@E'uGBe=0F>6fjG;D*Y~> Crypted in: Rot18 > Hex > TIGO-3FX > Base 85 I decrypted just Rot18: ~1gP.UT(a)K52T:gVOTOr=&S1sw1auLET(a)K5@1g.MOTOqg"S1 sw1b5%!T(a)K5@T@R'hTOqfdS1sw1gPEGT(a)K52T@R'hTOr=5S... 8 May 2010 10:06
Call for participants
Join NFS(a)Home! Help finish the Cunningham project, the longest ongoing computational project in history. ... 13 May 2010 11:36
Strongest (digital) signature algorithm ?
Hello, I was thinking about using RSA for it's signature capabilities... it's important that messages are signed... the messages themselfes can be out in the open... so encryption/decryption is not really needed and could actually make it less secure for small messages and require extra work for padding. I ... 7 May 2010 16:44
On the general benefits of introducing dynamics into encryptionprocessing
Mok-Kong Shen wrote: [snip] Previously in the thread "Introducing dynamics into block encryptions" (02.03.2010) I argued that the general menaces faced by block encryption algorithms stemming from eventual future significant progresses in researches on differential analysis, algebraic analysis, etc. etc... 6 May 2010 17:38
RSA question: Can public encryption/shared key (E+N) be usedas identification ?
On 06/05/2010 13:49, Skybuck Flying said: I have a question about the RSA public key encryption algorithm which is the following: I am wondering if it's possible to use the RSA public encryption/shared key as a means of identification ? Yers and no. Yes, it is common practice to use an RSA key pair... 6 May 2010 11:56
RSA question: Can public encryption/shared key (E+N) be used as identification ?
Hello, I have a question about the RSA public key encryption algorithm which is the following: I am wondering if it's possible to use the RSA public encryption/shared key as a means of identification ? So suppose two people are using the same name for example: iJustine iJustine One of them is the re... 6 May 2010 11:56
VBScript implementation of AES encryption
can someone show full code of VBScript implementation of AES encryption? ... 5 May 2010 11:32
First  |  Prev |  Next  |  Last
Pages: 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29