Questions tagged [encryption]
a transformation of information to make it unreadable to outside observers
73 questions
- Bountied 0
- Unanswered
- Frequent
- Score
- Trending
- Week
- Month
- Unanswered (my tags)
1
vote
1
answer
129
views
1
vote
1
answer
97
views
Converting encrypted messages to unencrypted results of an equally hard to reverse function
If we have some function, $f$ with an exponentially sized domain, mapping the set $\{0, 1\}^N$ to $\{0, 1\},ドル could we do something like this:
For ease, let's say $E(x) = x^e (\text{mod} \; n)$. This ...
0
votes
1
answer
89
views
Confusion on RSA attack equation
I am reading this paper on RSA attacks and it describes the equation where ed = 1 mod φ(N)
This confuses me because wouldn’t 1 mod of anything (not 1) just always be equal to 1?
0
votes
2
answers
160
views
Is there an algorithm to remap every Int32?
I'm making a web application that can generate unique unsigned Int32 post IDs for posts. Normally I would just make it auto-increment from 0.
But I don't want the ...
0
votes
0
answers
46
views
What is the encryption method that works without exchanging any public or private keys at all?
We are learning about encryption (e.g. RSA) in class at the moment and our teacher told us about a paper he had read (and didn't remember the name) which presented an interesting encryption method. ...
0
votes
2
answers
131
views
Is it possible to decrypt a string given part of the original string
Suppose I have an encrypted string of bytes. "T37mQkZosCsrcbqf/rvSWbd67qH3sXMggKdVd8fzMdg="
Suppose I know that somewhere in the original plain text string I know there is a string of ...
2
votes
2
answers
406
views
If someone has an encrypted message and it's original plaintext, could he guess the private key if it's the one used to encrypt the message?
In digital signatures, the private key is used to encrypt a (hashed) message and the public key is used to decrypt it. This made me wonder since the receiver has the cipher text (digital signature) ...
0
votes
1
answer
84
views
Sharing a requested secret number not knowing which
Alice has a list of secret numbers. Alice wants to give Bob the opportunity to choose one of her secret numbers, and then Alice has to share that specific secret number, but in such a way that Alice ...
9
votes
4
answers
2k
views
Why do public key systems involve private keys?
I read up the definition of a public key cryptosystem. It mentions there is a public key and a private key. That's confusing. Why is it called a "public key" system if it involves a private ...
2
votes
3
answers
732
views
How large is the seed in an encryption algorithm such as stream cipher?
The stream cipher is an encryption algorithm that was designed to approximate an idealized cipher, known as the One-Time Pad. It's crucial for a stream cipher to remain secure is to have a ...
1
vote
1
answer
89
views
What is the "formula" for "any cipher can be deciphered by a quantum computer"?
There are several quantum complexity classes in different ways analogous to NP: NQP, QMA, and, as I understand, others.
P=NP BPP=NP in simple words means "any cipher can be deciphered by a ...
1
vote
1
answer
170
views
RSA Encryption for specitic messages x with x = ap mod pq for ap-bq=1
I want to make a following proof but I got some difficulties with it.
Would be super if you people have any tips / advises.
Introduction:
Let (N,e) be our public key and (N,s) our private key with $N=...
0
votes
1
answer
94
views
Asymmetric encryption puzzle
I came across this riddle link question:
Your name's Graham.
Bob wanted to send Alice a secret msg m. However, he was concerned about the security. He encrypted his message with a keyword that both ...
1
vote
2
answers
103
views
encrypt with permutation ciphers
I came across this question:
You are given a permutation cipher defined by the bijection t: N -> N where,
...
1
vote
2
answers
307
views
Decryption of RSA
How can we decrypt an RSA message if we only have the public key?
For example,
Message:
21556870,12228498
Public Key: ...