Skip to main content
We’ve updated our Terms of Service. A new AI Addendum clarifies how Stack Overflow utilizes AI interactions.
Computer Science

Questions tagged [encryption]

a transformation of information to make it unreadable to outside observers

Filter by
Sorted by
Tagged with
1 vote
1 answer
97 views

If we have some function, $f$ with an exponentially sized domain, mapping the set $\{0, 1\}^N$ to $\{0, 1\},ドル could we do something like this: For ease, let's say $E(x) = x^e (\text{mod} \; n)$. This ...
0 votes
1 answer
89 views

I am reading this paper on RSA attacks and it describes the equation where ed = 1 mod φ(N) This confuses me because wouldn’t 1 mod of anything (not 1) just always be equal to 1?
Lydia's user avatar
  • 1
0 votes
2 answers
160 views

I'm making a web application that can generate unique unsigned Int32 post IDs for posts. Normally I would just make it auto-increment from 0. But I don't want the ...
Hao Wu's user avatar
  • 103
0 votes
0 answers
46 views

We are learning about encryption (e.g. RSA) in class at the moment and our teacher told us about a paper he had read (and didn't remember the name) which presented an interesting encryption method. ...
Ladan's user avatar
  • 1
0 votes
2 answers
131 views

Suppose I have an encrypted string of bytes. "T37mQkZosCsrcbqf/rvSWbd67qH3sXMggKdVd8fzMdg=" Suppose I know that somewhere in the original plain text string I know there is a string of ...
Ben Alan's user avatar
  • 131
2 votes
2 answers
406 views

In digital signatures, the private key is used to encrypt a (hashed) message and the public key is used to decrypt it. This made me wonder since the receiver has the cipher text (digital signature) ...
Manar's user avatar
  • 165
0 votes
1 answer
84 views

Alice has a list of secret numbers. Alice wants to give Bob the opportunity to choose one of her secret numbers, and then Alice has to share that specific secret number, but in such a way that Alice ...
9 votes
4 answers
2k views

I read up the definition of a public key cryptosystem. It mentions there is a public key and a private key. That's confusing. Why is it called a "public key" system if it involves a private ...
2 votes
3 answers
732 views

The stream cipher is an encryption algorithm that was designed to approximate an idealized cipher, known as the One-Time Pad. It's crucial for a stream cipher to remain secure is to have a ...
1 vote
1 answer
89 views

There are several quantum complexity classes in different ways analogous to NP: NQP, QMA, and, as I understand, others. P=NP BPP=NP in simple words means "any cipher can be deciphered by a ...
1 vote
1 answer
170 views

I want to make a following proof but I got some difficulties with it. Would be super if you people have any tips / advises. Introduction: Let (N,e) be our public key and (N,s) our private key with $N=...
0 votes
1 answer
94 views

I came across this riddle link question: Your name's Graham. Bob wanted to send Alice a secret msg m. However, he was concerned about the security. He encrypted his message with a keyword that both ...
x89's user avatar
  • 167
1 vote
2 answers
103 views

I came across this question: You are given a permutation cipher defined by the bijection t: N -> N where, ...
1 vote
2 answers
307 views

How can we decrypt an RSA message if we only have the public key? For example, Message: 21556870,12228498 Public Key: ...

15 30 50 per page
1
2 3 4 5

AltStyle によって変換されたページ (->オリジナル) /