Science topic

Cryptosystems - Science topic

Explore the latest questions and answers in Cryptosystems, and find Cryptosystems experts.
Questions related to Cryptosystems
  • asked a question related to Cryptosystems
Question
2 answers
"Note first that the discrete logarithm and integer factorization problem classes, which underlie several well-known cryptosystems, are only known to be in NP, they are not known to be NP-complete or NP-hard. The way we understand their complexity is by looking at the average run-time complexity of the current best-known (non-polynomial) algorithms for those two problem classes on randomly generated problem instances."
Relevant answer
Answer
сложность выполнения задачи факторизации N^0.5 Эта задача не может относиться к класс NP-полных. Количество операций растет как полином в степени 0.5. Сложность обусловлена размером чисел, но не более.
  • asked a question related to Cryptosystems
Question
2 answers
Dears,
Can you kindly please provide your experience in performing key-analysis for a cryptosystem? This includes brute-force analysis, sensitivity analysis, statistical analysis ... etc.
Also, are there any tools that help in that analysis? I mean to provide the plain and encrypted file as an input and receive the key-analysis as an output.
Thanks for your time.
Relevant answer
Answer
Dear Mohammad Nassef,
You may want to look over the following sources:
Cryptanalysis:
_____
How to Analyze a Cryptocurrency Using Fundamental Analysis:
_____
Differential Fault Analysis of Secret Key Cryptosystems:
  • asked a question related to Cryptosystems
Question
10 answers
In RSA cryptosystem, we generally take 1024 bits long prime numbers p and q. Is any problem if we take 512 bits long prime numbers? What are the security issues may be generated in real time scenario?
Relevant answer
Answer
I need codes to encrypt and decode images in Matlab for the following algorithms.
AES, with key 128 bit
AES, with key 256 bit
RSA, with key 1024 bit
RSA, with key 2048 bit
  • asked a question related to Cryptosystems
Question
3 answers
How Babai's algorithm is used in the lattice-based cryptosystem to find the closest vector of the basis? How the algorithm produces wrong results when we take a bad basis?
Relevant answer
Answer
hello.
please see the book an introduction to mathematical Cryptography by Jeffrey Hoffstein Jill Pipher Joseph H. Silverman , and see chapter 6, Babai’s algorithm page 379.
  • asked a question related to Cryptosystems
Question
8 answers
This is related to Homomorphic encryption. These three algorithms are used in additive and multiplicative homomorhism. RSA and El gamal is multiplicative and Pallier is additive.Now i want to know what is the time complexity of these algorithms.
Relevant answer
Answer
Want the encryption and decryption time complexity when used by pallier cryptosystem
  • asked a question related to Cryptosystems
Question
5 answers
In literature, various authentication protocols are developed using various cryptographic techniques such as RSA cryptosystem, ECC cryptosystem and so on. What are the most practical application areas of such protocols?
Relevant answer
Answer
TLS in your browser is built on authentication (at least of the server), every time you log in with a password to a web service or locally it is authentication of the client as well. Every time you use password and a second factor like a one-time device that puts in a few numbers to report to a server or a ubkey authentication using a public key from a USB. These are all authentication used all the time...on the web, locally, and to apps on your phone. Authentication is teh key to having an account in anything related to computing and connecting to the right servers!!!
  • asked a question related to Cryptosystems
Question
7 answers
There are various algorithm to generate the keys in Public Cryptosystem, e.g., Diffie-Hellman Key Exchange is very popular algorithm to generate and distribute the shared secret keys between two parties. However, I am interested to generate the shared key with the involvement session ID or number by Diffie-Hellman Key Exchange. What are different mechanism to perform these things.
Any alternative are also most welcome.
Relevant answer
Answer
A brief introduction to cryptography from the IBM website may also help you to understand: https://www.ibm.com/support/knowledgecenter/en/SSB23S_1.1.0.14/gtps7/seccon.html
This website will generate keys online:
  • asked a question related to Cryptosystems
Question
4 answers
In VANETs authentication of vehicle which is  the best PKI certification or identity-based cryptosystem
Relevant answer
Answer
They are incomparable: PKI can be used to certify public keys constructed by users where private keys are only at users. IBE is based on private keys constructed by an authority (outside the user's private space, assumed to be trusted). Certificate based systems   and certificate based encryption  attempt to combine the two: you get the IBE key and use a certificate based on it for a private key and use both keys to encrypt. The main thing to remember is that to embed a solution in your system you have to know what "trust assumption" is made in the system ad who is trusted and who is not and hw private you want your secrets to be.
  • asked a question related to Cryptosystems
Question
3 answers
Whether hamming weight, t of error vector is to be strictly n/2 or not?
n-length of the codeword 
Relevant answer
Answer
Dear Lakshmi, there is no way the minimum distance could be so high. Use the Plotkin bound to see how small the rate would be ( asymptotically zero). The dimension of the code one half I can believe. Not the minimum weight.
  • asked a question related to Cryptosystems
Question
5 answers
Classical vs quantum cryptography. Cryptographic algorithms that are safe.
How we can preserve our existing cryptosystem.
Relevant answer
Answer
In the public key technology area: Factoring and Discrete Log are broken by Quantum algorithms, so other techniques are needed like Lattice-based methods (these are non classical but more recent like NTRU, and others LWE, and so on). Recently, an attempt to develop quantum algorithms against lattices was published briefly (but it had some flaw, and it is not clear it is correctable-- it is a reminder though that all we know about quantum resistance is that we do not know such algorithms that are efficient; any day such algorithms can be found).
For signature schemes, post-quant. method include the one-way hash based (variants of Merkle).
In symmetric key cryptography, searching a list in quantum is square-root(N) rather than n, and therefore the measure is to double the key length as was done to AES (starting with 128 already factored in quantum search) and so on.
  • asked a question related to Cryptosystems
Question
5 answers
" In December 2015, Google and NASA announced that their shared D-Wave 2X quantum annealing computer solved a complex optimization problem up to 100 million times faster than a single-core classic computer did" 
IDC, Quantum Computing in the Real World, 2016.
Relevant answer
Answer
Newbie question/remark: AES( which is a private key crypto) is not dependent on the prime factorization problem, so the big push of Shor's algorithm is not relevant on AES. Right?
  • asked a question related to Cryptosystems
Question
7 answers
ECC ( Elliptic Curve Cryptography) can be implemented in different methods, it is more complex than RSA. In addition, its discrete logarithm problem is more difficult to break than the factorization. The researchers have tried to attack ECC, but it is infeasible using the computational resources.
In present, the security strength of ECC is stronger than other public key cryptosystems.
Any help will be the great appreciation. Thanks.
Relevant answer
Answer
I like ECC. But I need to know more about it. What is said about it here is absolutely true.
  • asked a question related to Cryptosystems
Question
3 answers
Dear all,
I'd like to know how many joules a scalar multiplication in the ECDLP  of ECC is needed? 
Best regards
Relevant answer
Answer
Everything depends on how you modify your algorithm ,CPU clock cycles to perform it , iteration process capacity of a processor for the running operation.Compare to the previous & the modified one.You'll understand. Better to apply on raw code.You can get the result in per/sec then convert it to j/s.In your needed result must have to know how many works the algorithm will perform in per second. - Thanks.
  • asked a question related to Cryptosystems
Question
3 answers
ECC researchers
Relevant answer
Answer
ECC requires shorter key to achieve security as compared to RSA, and that the mathematical operation involved in ECC is scalar multiplication while RSA uses exponentiation.  Because of these, computational complexity involved in ECC is much less as compared to other asymmetric cryptosystems.  
This enables much faster encryption, decryption and signature verification.  Also it saves bandwidh and memory space.  
Hence ECC is best suited for devices which have limited storage and computational power (like smart cards).  Also it is suited for web-browsers, which use a number of encryption sessions.
So your observation about ECC is right.
Regards.