Skip to main content

Questions tagged [key-size]

Key size is the size measured in bits of the key used in a cryptographic algorithm.

Filter by
Sorted by
Tagged with
2 votes
2 answers
52 views

I'd like to know benefits of RSA long keys (16386 and more bit length). I know the answer for server keys, but I'd like to understand what's happening if I use such long key for a user authentication. ...
Eir Nym's user avatar
  • 129
0 votes
2 answers
135 views

KMAC128 is defined as: newX = bytepad(encode_string(K), 168) || X || right_encode(L). return cSHAKE128(newX, L, “KMAC”, S). The definition of bytepad() is as ...
Aleister'Andrew Luci'Luzhin's user avatar
1 vote
1 answer
58 views

Suppose I randomly pick N=1-bit keys, and then "encrypt" the text "hello", encoded as 5 bytes of ASCII, so M=40 bits. It seems obvious, that the chance that two keys produce the ...
Harald's user avatar
  • 165
5 votes
4 answers
308 views

I mean, in a pragmatic sense, in terms of a brute-force difficulty. For example, if I have a random key accumulating $N$ bits of entropy, I’d expect to brute-force it in the order of $2^N$ trials. It ...
uk-ny's user avatar
  • 187
1 vote
1 answer
215 views

I'm currently studying the security mechanisms used by 1Password, particularly the Two-Secret Key Derivation (2SKD) sequence as described in section 8.2.1 of their white paper. Here's the specific ...
gradientsearch's user avatar
1 vote
3 answers
252 views

As I understand it, the chacha20 algorithm is designed for use with 256-bit keys, but is it possible to use shorter keys than this without compromising the security? Say if i use a 192-bit key and set ...
DerekKnowles's user avatar
1 vote
1 answer
136 views

I am using CKKS to securely compute one function. I am using Pyfhel library with the below parameters for the experiment: ...
Sumana Bagchi's user avatar
1 vote
1 answer
198 views

I need help wrapping my head around this notions on the key lengths and size. Exercise: Key sizes Task 1: Key size What is the key size of key for sequences of 10 ASCII characters? What is the ...
Simone Tosatto's user avatar
1 vote
1 answer
130 views

For a practical QKD implementation where OTP has been chosen for encrypting, how are key sizes determined? Say, for example, Alice wishes to exchange xGB to Bob, then a key management system should ...
Niall Canavan's user avatar
2 votes
0 answers
120 views

NXP has a custom (I think) encryption protocol known as "Leakage-Resistant Primitive", or LRP, built on top of AES. I think the goal of this is to basically "expand" the length of ...
johnnyb's user avatar
  • 121
1 vote
0 answers
41 views

I have code where someone made the key 64 bytes (32*2) and passes to the derive_key() function. It then uses the key created for ...
user3161924's user avatar
1 vote
0 answers
177 views

For starters, I don't need any don't-roll-your-crypto stuff. We're discussing a hypothetical. So the idea is 3DES needs 3x the key size and achieves only 2x key size bit security. So using the 3x ...
Bobboidsquoomy's user avatar
1 vote
0 answers
80 views

Cracking an ideal block cipher is basically a brute force key enumeration. The complexity of the attack is exponential, growing as $2^b$. Cracking ECC is also exponential, but the cost grows as $2^{\...
槿铃兔's user avatar
0 votes
0 answers
50 views

I would like to deterministically derive two different 256-bit keys from a single passphrase -- one used as an ECDSA private key, the other as a symmetric key for AES-GCM. Would a KDF output ...
Astrochamp's user avatar
3 votes
1 answer
185 views

Can we define an RSA variant in which the public key with $n$-bit public modulus $N$ has a compact representation of $\kappa\ll n/2$ bits, with a security argument that it is as safe as regular RSA ...
fgrieu's user avatar
  • 151k

15 30 50 per page
1
2 3 4 5
22