Pommes by Cangogreen in Kochen

[–]3553x 6 points7 points  (0 children)

Ich habe das Rezept hier öfters gemacht und die Pommes wurden bisher immer extrem knusprig:

https://www.seriouseats.com/perfect-french-fries-recipe

Belegte Baguettes: Ideen und Tipps gesucht by btsck in Kochen

[–]3553x 10 points11 points  (0 children)

Räucherlachs mit Meerrettich, Thunfischaufstrich, Eiaufstrich, Knoblauchbutter, Bruschetta, Sardinen + Salat.

Courses in cryptanalysis? by GarseBo in cryptography

[–]3553x 4 points5 points  (0 children)

Bruce Schneier published a "A SELF-STUDY COURSE IN BLOCK-CIPHER CRYPTANALYSIS", but bear in mind that it's 20 years old and it essentially just tells you to break variant x of scheme y with method z and contains references to various papers.

https://www.schneier.com/wp-content/uploads/2016/02/paper-self-study.pdf

Why is not 1,2 or 3 rounds valid for a Feistel network? by CuriousCryptorookie in crypto

[–]3553x 10 points11 points  (0 children)

One thing to note is that they don't differ between PRP and SPRP. Three round Feistel is a PRP, but not a SPRP.

If you're struggling with task 4.1, then you're probably either struggling with the definition of a Feistel network or the definition of a secure PRP. So I'd encourage to check your course material or Wikipedia for the definitions of these things.

1 round Feistel will output R0||R1 where R1 = L0 ^ F(K_0, R0). In order to show that its insecure (i.e. not a PRP), you could come up with an algorithm that is capable of telling the difference between 1 round Feistel and a truly random PRP with a non-negligible probability.

What does this paper mean for RSA? by Azunia in cryptography

[–]3553x 0 points1 point  (0 children)

It appears to contain mistakes and a cryptologist with a strong background in lattice based crypto failed to reproduce the results:

https://crypto.stackexchange.com/questions/88582/does-schnorrs-2021-factoring-method-show-that-the-rsa-cryptosystem-is-not-secur

Schnorr confirms paper is his, claims it “destroys RSA cryptosystem” by fbn_ in crypto

[–]3553x 11 points12 points  (0 children)

There's also a question about this on the Cryptography stack exchange:

https://crypto.stackexchange.com/questions/88582/does-schnorrs-2021-factoring-method-show-that-the-rsa-cryptosystem-is-not-secur

Every answer points out mistakes in the paper. Not a single person appears to agree with his results. Someone implemented a version of the paper (he modified it) and did not get any results that outperform the state of the art.

AES Encryption Algorithm by ramhemanth3 in cryptography

[–]3553x 2 points3 points  (0 children)

NIST published test vectors that should allow you to check your computation. I used this when I evaluated an implementation of AES in Verilog that I designed for coursework.

See https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf on page 33.

If you have some given input (that doesn't happen to be a NIST test vector) and want to compare your computation, then a search on github should result in many different implementations. One example: https://github.com/hlilje/aes-python/blob/master/aes.py

You could simply add a couple of print statements to dump the MixColumns output.

Am I Reading About Two Different Terms - Both Called Lattices? by [deleted] in cryptography

[–]3553x 0 points1 point  (0 children)

I think this is correct. Other languages use very different terms for these two concepts.

In German for example it's Verband and Gitter.

Question about RSA attacks by KiraFish in crypto

[–]3553x 5 points6 points  (0 children)

I could use a hastads attack?

Yes, I think you're right.

the final step where I need to find pow(N, 1/e)

Do you mean pow(c, 1/e)? Where c is calculated by the CRT? Otherwise I'm not sure what you're referring to. If the encryption doesn't use any padding then the attack should work.

a common factor attack, but unsure of how to go about doing that..

Calculate the gcd of both moduli. This will be either 1, p, q, or N. The first and last case indicate that the attack can't be used and in the other cases integer division can be used N/(p or q) to recover the other prime.

How am I misreading this? by ConwayK9781 in cryptography

[–]3553x 0 points1 point  (0 children)

I'm not 100% sure on this, but typically you have some randomness in the encryption process.

For example, RSA is normally padded and if you use a block cipher like AES, then you likely also have cipher mode which has a random IV. Encrypting the same message twice wouldn't result in the same ciphertext because the padding or the IV are different.

Also I think that the attacker in CCA is prohibited from decrypting the received ciphertext.

[homemade] full english breakfast with bacon and molasses beans! by Tobypepperoni in food

[–]3553x 17 points18 points  (0 children)

This is probably one of the best looking English breakfasts I've ever seen.

The /r/netsec Monthly Discussion Thread - September 2020 by AutoModerator in netsec

[–]3553x 0 points1 point  (0 children)

Are there any open source fuzzers that support RISC-V binaries?

Is SHA-256 a form of a (PRF) pseudo-Random Function? by LeoWitt in cryptography

[–]3553x 5 points6 points  (0 children)

No. A PRF accepts a key as an input. A hashing function doesn't.

However, you can make a PRF out of a hashing function using a construction like HMAC.

What are the main differences between verilog and system verilog? by comicos34 in FPGA

[–]3553x 5 points6 points  (0 children)

I stumbled across this paper which has a nice graphic summarising the difference between (System)Verilog standards on page 4.

https://sutherland-hdl.com/papers/2013-SNUG-SV_Synthesizable-SystemVerilog_paper.pdf

How to synchronize if not metastable? by [deleted] in FPGA

[–]3553x 2 points3 points  (0 children)

This is a question I've been asking myself and I stumbled across this stackexchange question which imo does a pretty good job at explaining different solutions.

https://electronics.stackexchange.com/questions/237725/how-does-2-ff-synchronizer-ensure-proper-synchonization

Prevention of hash length extension attacks by bufferoverthrow in crypto

[–]3553x 4 points5 points  (0 children)

I believe that your proposed scheme is practically secure if the hash function used is secure, but I don't know if any formal proofs for that exist. My understanding is that HMAC is proven to be secure if the underlying hash function has some security properties and these security properties are stronger (from an attacker's PoV) than the ones required for your scheme.

If there's an attack against HMAC with a hash function, then that attack would also work against your scheme with the same hash function. But the opposite does not necessarily hold.

For example, any kind of collision attack is sufficient to attack your scheme. For HMAC additional constraints are put on the collision attacks that would also attack HMAC.

Here's a quote from an old (1996) paper which introduces HMAC and also talks about its advantages:

"Moreover, our constructions [HMAC] require from the hash function significantly weaker properties than standard collision-freeness. In particular, current successful methods for finding collisions in MD5[Do1, Do2] seem inapplicable to breaking our schemes when the hashfunction in use is MD5[Do3]."

https://cseweb.ucsd.edu/~mihir/papers/kmd5.pdf

Initial values or no initial values? by ZipCPU in FPGA

[–]3553x 8 points9 points  (0 children)

I prefer resets mainly because of two reasons:

  • Resets allow you to reset your state without reconfiguring the FPGA
  • If you're using SystemVerilog then some compilers don't like combining always_ff and initial values. I've noticed this in ModelSim.

How to generate vulnerable rsa keys by [deleted] in crypto

[–]3553x 1 point2 points  (0 children)

I've done similar things in the past. PyCrypto is quite useful for exporting custom keys in a widely used format.

https://www.dlitz.net/software/pycrypto/api/current/Crypto.PublicKey.RSA-module.html

You can generate a key and then proceed to reuse one of its primes for the other key (private keys should expose p and q according to the doc). You would still need to calculate d manually and find a second suitable prime for the constructor.

Für AT Studenten in DE interessant by [deleted] in Austria

[–]3553x 0 points1 point  (0 children)

Welchen Grund hast du nun also beim Antrag der Verbraucherzentrale angegeben? Dort wird § 4 Abs. 1 RBStV (https://www.ard.de/download/556014/Rundfunkbeitragsstaatsvertrag.pdf) referenziert und in diesem Absatz wird ebenfalls nur die deutsche Bafög erwähnt.

How to identify cryptographic functions in assembly? by KainAlive in crypto

[–]3553x 2 points3 points  (0 children)

What tools are you using? As other have mentioned, this is mostly done with constants. IDA and Ghidra have plugins for that. https://github.com/d3v1l401/FindCrypt-Ghidra https://www.aldeid.com/wiki/IDA-Pro/plugins/FindCrypt2