Science topic

Cryptology - Science topic

Explore the latest questions and answers in Cryptology, and find Cryptology experts.
Questions related to Cryptology
  • asked a question related to Cryptology
Question
3 answers
Perhaps because many long necked turtles live in fresh water.
Zug, George R.. "snake-necked turtle". Encyclopedia Britannica, 5 Jun. 2020, https://www.britannica.com/animal/snake-necked-turtle. Accessed 16 July 2024.
Relevant answer
Answer
There are no giant long-necked sea turtles, In addition, if it lived in fresh water it would not be a sea turtle. The long-necked turtles all live in tropical or subtropical climates. This is just a silly question.
  • asked a question related to Cryptology
Question
2 answers
Yes because critical rationalism recognizes substance, parsimony and identity(adjusts premises upon contradiction), while skeptical empiricism believes all results from impressions. Skeptical empiricism also believes the self is an illusion.
Relevant answer
Si lo es, definitivamente, porque el gran valor de la CIENCIA RACIONAL, a demostrado y lo sigue haciendo hoy,su inconmensurable valor social y humano al solucionar infinidad de padecimientos y grandes sufrimientos humanos. Además del la mayor duración y esperanza de vida actual es disfrutada y dá esperanzas de ser prolongada.
  • asked a question related to Cryptology
Question
3 answers
Relevant answer
Answer
No, tail risks do not prompt cryptozoology.
  • asked a question related to Cryptology
Question
2 answers
Is the closest known living relative to a plesiosaur a sea turtle?
Relevant answer
Answer
Muhammad Ulmar is right about this question.
  • asked a question related to Cryptology
Question
1 answer
Lets have a discussion with regards to OSI physical and datalink layer transmission (signalling) technologies in the presence of quantum assisted crypt analyzers.
We can base our discussion on the advent of the Next generation Networks(NGN) such as 5G Standalone Architecture: 5GCore, 5G Edge, 5G NR and IP eXchange.
Discussion Questions:
------------------------
1. How are these networks going to handle quantum crypt analysis from classical perspective especially where the networks interconnect and interoperate?
2. While newer cryptology modules are being introduced, how likely are they in terms of speed to counter quantum technologies in the interconnect where key exchange handover happens?
3. NGN introduced Network Function Virtualization based on Software Defined Technologies using slices. How likely in terms of quantum that the actual Core Technologies in terms of configuration and Misconfiguration can be compromised to a point that the entire topology can be down affecting the entire ecosystem?
Lets discuss, I am still learning and ready to learn from the experts, where proper phrasing is needed please advise, I will gladly update. OSI L1/L2 as reference model will be a great start.
Relevant answer
Answer
Quantum cryptanalysis poses a significant challenge to classical cryptographic systems due to its potential to break some widely used encryption algorithms. To mitigate this risk in network communication, classical networks can implement post-quantum cryptographic algorithms, which are resistant to quantum attacks. Additionally, network operators can employ hybrid encryption schemes that combine classical and quantum-resistant algorithms to ensure security. However, ensuring interoperability and security across interconnected networks will require careful design and coordination to address potential vulnerabilities.
  • asked a question related to Cryptology
Question
11 answers
If we have a cryptography algorithm x  .. how can we practically evaluate its strength ?
Relevant answer
Answer
You might want to read this, to see how AES was evaluated:
Key size, vulnerability to known attacks, performance (computation time) with different types of data, flexibility of application to different platform types, randomness of cipher, cost, and so on. I think that in terms of strength, aside from key size, randomness is very important, even when encrypting repetitive plaintext.
This paper looks mostly at performance comparisons:
The favorite these days still appears to be AES, and many of the others have been downgraded, such as DES. So we can expect AES to be scrutinized most, in the near future.
  • asked a question related to Cryptology
Question
4 answers
HVC : Halftone Visual Cryptography
In HVC we generate halftone image then its complementary after that we embed the secret image into them. by stacking the two shares we recover the secret. my Q is when we calculate some metrics such as Recall F-measure between which images ? is between halftone image before embed the secret and after embed the secret 
Relevant answer
Answer
Ok. Now how to encode the black and white pixels?i was trying with the mayrices
1 0 0 0             1 0 0 0
1 0 0 0             0 1 0 0
1 0 0 0          0 0 1 0
1 0 0 0  and  0 0 0 1
But it is not working!
  • asked a question related to Cryptology
Question
4 answers
I am using steganography using DWT + Quantitative embedding processing and this embedding look weak because it doesn't support any attack. kindly suggest me what can be done to improve the above stegano process and I have used PSNR ,KL distance  BER and PRD  for performance evaluation . if there is any other metrics that can used to performance evaluation and suggest some attacks that can be done on stegno image
Relevant answer
Answer
thank you Nayeen
  • asked a question related to Cryptology
  • asked a question related to Cryptology
Question
1 answer
Currently i am working on authentication as well as transmission part, can anyone suggest me where i can implement my work in real time application?
Relevant answer
Answer
  • asked a question related to Cryptology
Question
3 answers
Since from their inception, all most all the attacks on McEliece cryptosystem and its variant Niederreiter cryptosystem have been unsuccessful. They are believed to resist even quantum attacks. These two are code-based Public-key cryptosystem whose private key consists of a generator matrix of a Goppa code. All other modified versions of these cryptosystems which were proposed by replacing Goppa codes with other codes have been proven to be insecure. In view of this, what is the structural advantage that Goppa codes enjoy over other families of codes that makes them so strong for cryptographic applications?
Relevant answer
Answer
@AR Reddy: the Goppa codes used in crypto are introduced by elementary means ie
explicit generator matrices. While they can be described by means of AG codes it is hardly relevant there. Historically they were introduced **before** general AG codes on curves. Also I dont understand your comment on the size of the key which depends only on the parameters n,k,q and not on the choice of the family of codes...
  • asked a question related to Cryptology
Question
39 answers
In my view, the formal solution ``P vs NP'' is found in the narrow sense.
Relevant answer
Answer
I am reading your article to understand your above response. I will reply you later.
  • asked a question related to Cryptology
Question
4 answers
I am new in Steganalysis side. Can anyone guide me implementation of RS analysis (Fridrich 2001), paper implementation, or have any reference code?
Relevant answer
Answer
Finally i developed RS steganalysis code by myself with the help of 
Thanks
  • asked a question related to Cryptology
Question
9 answers
when hide some bits of secret message in DCT coefficients ,we note some lossy in extracting message(sorry for bad English)
Relevant answer
Answer
There are three methods of data hiding. In cryptography, we can openly announce that we added some data and the interceptor don't have key to open. In watermarking also, we can announce the same, but interceptor can attack te file to remove the data. We need to embed small data for identification. However, in steganography, we cannot announce to anybody, because if anyone is able to find the presence of data in image, they can remove the file. So our aim will not be achieved. So, in steganography, We must be able to exploit HVS (Human Visual System). This we can achieve using frequency domain because our eyes cannot detect high frequencies. So, either you can go for DCT or DWT. if you are using DCT, don't worry about lossy compression. You just have to aim to embed the data in low frequencies which you can decide that how much compression your file can handle. Check out papers in my profile on watermarking. You can check the tables mentioning the compression attacks.
  • asked a question related to Cryptology
Question
3 answers
I think we prefer Public-key Cryptography, because of its computationally hardness, over Private-key Cryptography. Is this the only reason or?
Relevant answer
Answer
First, asymmetric cryptography takes two forms: authentication and confidentiality
For message confidentiality, the message is encrypted with the receiver's public key and only the authentic receiver who has the corresponding private key can successfully decrypt it.
For message authentication, it is the other way around, encryption is done with the sender's private key and any receiver who holds the corresponding public key can decrypt the message. A successful decryption indicates that this message is from the claimed sender.
The choice over public or private key cryptography would depend highly on the exact place of non-interactive application you have in mind and how would (or did) you implement it.
For example, suppose you would like to control the access of you application that only you would like to use. You may prefer a symmetric cryptography (private key) to achieve this (although a conventional method is to use a digest function like MD5).
But, if you would like to selectively lock a specific functionality of an application that you would like to distribute (to customers), you may want to create a configuration file and encrypt it. If this is done with a symmetric key, then one way or another, the application must include the symmetric key along with it to decrypt the config. file for use - a simple reverse engineering attempt can locate the key within the application.
The solution thus lies in public key cryptography. You can encrypt your config. file in your own system with your private key, then store the public key along with the application to decrypt it for its use. You can encode the config. file to include the MAC address of the system or the disk ID for an integrity check for the machine it is entitled to operate in. This is what I did for my ERP application, it works just fine.
  • asked a question related to Cryptology
Question
9 answers
tools which help to measure the complexity (level of security) to encryption design,
to other type of time complexity.
Relevant answer
Answer
I do agree with the above answers and one more parameter is performing randomness tests, the more randomor unpredictable the encrypted data be the more complex will it be and difficult to break.
  • asked a question related to Cryptology
Question
5 answers
Suppose we are considering only confidentiality and for now just ignoring the active attacks. So we encrypt the email with the secret key generated by online trusted third party and then send both the ticket and encrypted email to the receiver. By ignoring the problems and drawbacks of the online trusted third party. So what are the problems with this mechanism? Also for each email/session we are using a new key.
Relevant answer
Answer
Who is the threat in your question? If I am reading it correctly you are excluding the trusted third party as a threat, and you are excluding any active attackers. The rough answer to your question is that if there are no threats you could send the email in clear text and be just fine. Encryption is only necessary if you are protecting yourself from something.
Alternatively, you may be viewing passive network monitors as threats. For example, systems that are scanning email for keywords at the boarder of an organization. However, most passive monitors can be easily handled by even XORing the bits, a complex security protocol is only needed in the presence of an active attack on the email in question.
Finally, if you are assuming that there are no active attackers, and you actually have a trusted third party, you would be much better served by using stenography than public/private key encryption. Passive monitors are likely looking for odd things to flag for further scrutiny, a hidden email is more likely to pass unnoticed than an encrypted one.
  • asked a question related to Cryptology
Question
3 answers
The correlation attack is one of the most important attacks that attacks stream cipher. Can someone share an illustrative example of a simple application process for this attack.
Relevant answer
Answer
Maybe the following work could help you: http://lasecwww.epfl.ch/pub/lasec/doc/YV04a.pdf.
Regards,
Llanos