Newest Questions
32,059 questions
0
votes
0
answers
13
views
Can Pre-Computed SAT Solution Speed Up SHA-256 Preimage Search via Unit Propagation?
I've encoded unconstrained SHA-256 compression as CNF:
512 free input variables: msg_w{i}_b{j} (message bits, LSB-first)
256 output variables: ...
0
votes
0
answers
18
views
Modular binomial exponent manipulation and assumption of coprimality
I was looking a problem around a system of modular binomials that are:
When I hit a point I couldn't go further I found out on internet what a person did and could not understand what he did with an ...
0
votes
1
answer
66
views
Is Homomorphic Encryption constructed like a Header?
New to homomorphic encryption here... but are there fields in homomorphic encryption (like headers) where each field has a unique key? For example, suppose I have $4$ fields $<a> <b> <c&...
1
vote
0
answers
23
views
Two related question on MQ cryptosystems
Is it true that MQ is very hard when the number of equations ($m$) equals the number of unknowns ($n$)? According to https://eprint.iacr.org/2010/596.pdf , this is true going by the mentions of:
... ...
8
votes
2
answers
929
views
Strength of AES when 32-bits of the 128-bit key are known?
This could be related to any cipher, but this is specific so some AES hardware. In this hardware, a 128-bit random number is exchanged, as one does, between hosts. Due to a hardware quirk, the last ...
0
votes
0
answers
26
views
Is this PRF + nullifier + signature construction secure for one-time tokens in a non-currency setting?
I am designing a non-currency protocol that enforces one anonymous action per legitimate purchase (in my case: one review per purchase). I would like to sanity-check the following construction built ...
1
vote
1
answer
50
views
ML-DSA without lattice
Community convention remainder first: no cryptanalysis request on full scheme barring able to formulate questions on specific building blocks, so here it goes:
Q: Suppose we replace the matrix ...
3
votes
0
answers
37
views
Use of symmetric remainder (balanced mod) to eliminate branching in polynomial additions for lattice-based cryptography: prior art/known limitations?
I have been exploring a formulation of integer division where the remainder is taken from the symmetric interval:
$$[−⌊d/2⌋,⌊d/2⌋]$$
instead of the classical interval:
$$[0,d)$$
Mathematically this is ...
2
votes
1
answer
591
views
Why can't you reverse engineer a valid ML-DSA secret key from a public key?
ML-DSA works using vectors and matrices of polynomials. Each polynomial has coefficients in a finite field $\mathbb{F}_q$ - This group of polynomials is a ring denoted $R_q$.
Matrix-vector ...
4
votes
1
answer
269
views
Why doesn't Learning With Errors use pseudoinverses?
The goal behind solving Learning with Errors (LWE) is to solve a system of equations modulo q with a small, random error. My thought is that because these equations would have a solution outside the ...
1
vote
0
answers
61
views
What is the real philosophical (geometric) reason for using a (discrete) Gaussian distribution for errors in the LWE problem?
I've stumbled upon a PhD thesis, "Smoothening Functions and the Homomorphism Learning Problem" [Ruzi-Lopez, Waterloo2020].
Before coming across this thesis, I thought (discrete) Gaussian ...
0
votes
0
answers
45
views
Universal one-way function from Rule 110 cellular automaton?
Are you aware of any examples of universal one-way function construction using a cellular automaton (for instance Turing-complete Rule 110) or of any sufficiently strong cryptographic hash function ...
1
vote
1
answer
24
views
Can one call transition of tables from unencrypted to encrypted state in MariaDB using the file_key_management plugin key rotation?
In MariaDB it is possible to apply data-at-rest encryption using a plugin called file_key_management. This plugin uses a plain text file containing one ore more keys which are ids assigned like this (...
2
votes
0
answers
28
views
Two hole hidden number problem, calculating the limits of solvability
I'm a bit stuck on the problem mentioned in the title. It seems from the ctf writeup that I am going through and trying to understand.
Here is the link for the in depth explanation:
https://ctftime....
3
votes
0
answers
69
views
What's the point of the X-Wing hybrid KEM?
As I understand it, X-Wing is an optimisation over GHP18, in which it is proven in Lemma 3 that there exists standard notion PRF, when used as KEM combiner, the resulting KEM will not be IND-CCA ...