Science topics: Computer Security and ReliabilityCryptosystems
Science topic
Cryptosystems - Science topic
Explore the latest questions and answers in Cryptosystems, and find Cryptosystems experts.
Questions related to Cryptosystems
"Note first that the discrete logarithm and integer factorization problem classes, which underlie several well-known cryptosystems, are only known to be in NP, they are not known to be NP-complete or NP-hard. The way we understand their complexity is by looking at the average run-time complexity of the current best-known (non-polynomial) algorithms for those two problem classes on randomly generated problem instances."
Dears,
Can you kindly please provide your experience in performing key-analysis for a cryptosystem? This includes brute-force analysis, sensitivity analysis, statistical analysis ... etc.
Also, are there any tools that help in that analysis? I mean to provide the plain and encrypted file as an input and receive the key-analysis as an output.
Thanks for your time.
In RSA cryptosystem, we generally take 1024 bits long prime numbers p and q. Is any problem if we take 512 bits long prime numbers? What are the security issues may be generated in real time scenario?
How Babai's algorithm is used in the lattice-based cryptosystem to find the closest vector of the basis? How the algorithm produces wrong results when we take a bad basis?
This is related to Homomorphic encryption. These three algorithms are used in additive and multiplicative homomorhism. RSA and El gamal is multiplicative and Pallier is additive.Now i want to know what is the time complexity of these algorithms.
In literature, various authentication protocols are developed using various cryptographic techniques such as RSA cryptosystem, ECC cryptosystem and so on. What are the most practical application areas of such protocols?
There are various algorithm to generate the keys in Public Cryptosystem, e.g., Diffie-Hellman Key Exchange is very popular algorithm to generate and distribute the shared secret keys between two parties. However, I am interested to generate the shared key with the involvement session ID or number by Diffie-Hellman Key Exchange. What are different mechanism to perform these things.
Any alternative are also most welcome.
In VANETs authentication of vehicle which is the best PKI certification or identity-based cryptosystem
Whether hamming weight, t of error vector is to be strictly n/2 or not?
n-length of the codeword
Classical vs quantum cryptography. Cryptographic algorithms that are safe.
How we can preserve our existing cryptosystem.
" In December 2015, Google and NASA announced that their shared D-Wave 2X quantum annealing computer solved a complex optimization problem up to 100 million times faster than a single-core classic computer did"
IDC, Quantum Computing in the Real World, 2016.
ECC ( Elliptic Curve Cryptography) can be implemented in different methods, it is more complex than RSA. In addition, its discrete logarithm problem is more difficult to break than the factorization. The researchers have tried to attack ECC, but it is infeasible using the computational resources.
In present, the security strength of ECC is stronger than other public key cryptosystems.
Any help will be the great appreciation. Thanks.
Dear all,
I'd like to know how many joules a scalar multiplication in the ECDLP of ECC is needed?
Best regards