First  |  Prev |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
on the paper "Side Channel Cryptanalysis of Product Ciphers"
Hello, I'm referring to a 2000 paper by J. Kelsey, B. Schneier, D. Wagner and C. Hall. In Section 6 they work out a Hamming-weight cryptanalysis against DES. They qualify this as a kind of ciphertext-only attack (2nd paragraph). One point of the attack that is not clear to me is the following: at some point (... 9 Jul 2010 18:19
sci.crypt kill file : help
Hi sci.crypt, There is an emotionally disturbed person on sci.crypt who keeps insulting me in his replies. How do I create a kill file so I do not see replies by that one person? The website I like to read is http://groups.google.com/group/sci.crypt ... 11 Jul 2010 15:58
A new prime number pattern
Date: 9-7-2011 Time: 16:11 Dear reader, I want to apologize for my English writing. I have found something very weird in the prime numbers. It looks like a very weird pattern that needs to be more understanding. I am not a mathematician. I hope you can understand the theory. The theory is not known yet. ... 9 Jul 2010 13:53
A plead for simple encryption schemes
I wish to learn herewith experts' opinions on the following humble thoughts of mine concerning the desirability and feasibility in 'practice' of employing comparatively simple encryption algorithms. (1) Through employing distinct message keys, or if needed frequently enough dynamically changed keys during the pro... 24 Jul 2010 14:29
My Recent Posts and the Fallout Aggro.
I am aware that the stuff that I am expounding isn’t exactly music to the ears of some readers and I would like to air a few matters that seem to require expanding. My attitude in cipher design is that the core mathematics must be totally and utterly irreversible by any illegal means – it must be bomb proof,... 9 Jul 2010 11:39
Secret Sharing - Error Correction Coding (Shamir)
Hi, I was informed a few years ago that Shamir's secret sharing scheme is essentially a form of natural error correction coding. That is, in the scenario where say n=5 and t=4 and I have all 5 shares but two of them are corrupt. Apparnetly I can use the other shares to repair the two damaged ones. Is the... 4 Aug 2010 13:36
GOST hash, BROKEN?
i read on wiki that the gost hash was broke and was wondering if someone could explain at what level? like to a newbie, is it now worthless or is the attack minor? any opinions on the hash or the actually algorithm welcomed. ... 8 Jul 2010 03:43
Solve the code
http://news.yahoo.com/s/yblog_upshot/20100707/od_yblog_upshot/the-secret-code-in-u-s-cyber-commands-logo ... 8 Jul 2010 13:38
A more complex polyalphabetic substitution processing
The following updates/combines some tiny humble ideas of mine, expressed on diverse occassions sometime somewhere, in making the classical polyalphabetic processing more complex, in the hope of rendering it much harder for the analyst to work on (with attendant higher computing cost, understandably). We assume... 23 Jul 2010 10:17
Spelling it Out.
Weak cryptography means ciphers that have to be shored up with user assistance like for instance the RSA cipher that is clearly unable to stand alone and requires very expensive user assistance. Effectively this is saying that it requires specialist management which is a contradiction of good cipher design. Furt... 11 Jul 2010 21:35
First  |  Prev |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16