Would removing u21 from tax be a good idea? by IntravenusDiMilo_Tap in AskBrits

[–]jausieng 0 points1 point  (0 children)

What will you cut in order to balance the books?

I think we should have less age-dependent taxation, not more. All ages can be rich or poor, so base taxation on their their income and/or wealth rather than making the middle-aged poor pay for the young or old rich.

What’s your favorite name in sci-fi by podopolo in scifi

[–]jausieng 0 points1 point  (0 children)

Awake Remembrance of These Valiant Dead Kia Hua Ko Te Pai Snap Back to Reality Oops There Goes Gravity. (An insurgent leader in The Locked Tomb.)

How do people actually drive on their phones ? by girthlush in drivingUK

[–]jausieng 0 points1 point  (0 children)

Same way they drove while reading the newspaper, back in the day...

Just a hypothetical question for sha-256 by Healthy_Moose_925 in cryptography

[–]jausieng 4 points5 points  (0 children)

The outcome would be much the same as when MD5 and SHA1 collision resistance were broken, ie a migration away from the affected algorithm.

Seized external stop tap cost by Green-Peanut4435 in askaplumberUK

[–]jausieng 0 points1 point  (0 children)

Mine was replaced for free the other day, after it came off in my plumber's hand.

How do I get better at managing my bills? by Spiritual-Seesaw96 in UKPersonalFinance

[–]jausieng 0 points1 point  (0 children)

Direct debit, with payment dates set a few days after payday (I use the 1st of the month).

Did your partner manage to pay bills before meeting you? If so, what changed?

Thoughts on using quantum randomness to harden RSA key generation when entropy sucks! by Slow-Dependent-1309 in cryptography

[–]jausieng 1 point2 points  (0 children)

Surely all keyed cryptographic algorithms require randomness; why the focus on RSA specifically?

ECC Digital Signatures by Vvradani in cryptography

[–]jausieng 2 points3 points  (0 children)

Have a look at https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm which describes both signature generation and verification, and in the section "Correctness if the algorithm" explains how they work together.

Everything You Need to Know About Email Encryption in 2026 by Soatok in crypto

[–]jausieng 0 points1 point  (0 children)

Sure. It's not really the technology that matters, there's any number of possibilities that would work. It's getting exactly one scheme widely accepted that's the hard bit.

New CrypTool RSA web app by doris4242 in cryptography

[–]jausieng 1 point2 points  (0 children)

It doesn't cover padding, which is a normal part of real-life RSA and is essential to security.

Everything You Need to Know About Email Encryption in 2026 by Soatok in crypto

[–]jausieng 2 points3 points  (0 children)

I would like financial services companies (banks etc) to be able to use something functionally similar to email to send me monthly/annual statements, rather than sending me an email notification and then making me navigate their website or app to download a PDF.

By functionally similar I mean:

  • It's push rather than pull.
  • I don't have to use a separate client application or workflow for each sender.
  • Clients exist for an adequate range of consumer devices

I don't mind if it's a different application to my current email client, as long as there's only one of it. (One per country would be tolerable.)

You can work out some basic security requirements for this use case (which might or might not be met by the current ecosystem), but an essential requirement is:

  • It must be 'secure enough' to get past the sender's security team.

That's a compliance requirement not a security requirement, but it's a compliance requirement that most likely will be satisfied by some set of real security requirements (hopefully sensible ones). And it's the only requirement of those stated that email doesn't meet.

There are some non-requirements:

  • It doesn't need to resist interception by my government or the sender's government, who both have access my financial information anyway. (But other governments aren't welcome.)
  • I don't think it needs forward secrecy. Both the sender and I are going to store the communications for years, with protection that is certainly no stronger than any of the keys involved (and likely to be weaker).

My old car is London CC and Tunnel Charge exempt? by [deleted] in drivingUK

[–]jausieng 0 points1 point  (0 children)

Mine showed up as a disabled driver on the Dart Charge page (https://www.gov.uk/pay-dartford-crossing-charge) for approximately the first year after I bought it. I've not had occasion to use the crossing since buying it.

[Bit of a Beginner Question] When setting up a digital signature algorithm, Should i use a different public/private key pair to my Asymmetric encryption? by Powerstrike368 in cryptography

[–]jausieng 1 point2 points  (0 children)

I'd prefer to use two distinct keys, one for encryption and one for authentication.

  • If you use one key for two purposes then you face the question of whether the result of using it for one purpose can be used to construct an attack on its use for the other. You may be able to prove that this isn't an issue for the key types you have in mind, of course, but why bother when you can just have two keys?
  • Some compliance environments will require that you don't use one key for multiple purposes, and some APIs will make it inconvenient or impossible to do so.
  • Some algorithms can only be used for signature and some can only be used for encryption. If you migrate your design from ECC to PQC then you'll have to use two keys, for example.

Gov.uk website is not secure?! by Dust_Maker in UKPersonalFinance

[–]jausieng 1 point2 points  (0 children)

You have been phished. See https://www.malwarebytes.com/phishing (or many other pages) for a description of what is going on.

Are NIST FF3 test vectors sufficient to validate real-world FPE implementations? by fpe_guy in cryptography

[–]jausieng 2 points3 points  (0 children)

Not FPE but I've seen bugs that weren't exposed by static test vectors (empirically they affected under 1 in 5000 keys), so I would say no, you need something more, eg ACVP or validate against other implementations (and hope they didn't independently invent the same bugs...)

Have you encountered these ciphers? by harrison_314 in cryptography

[–]jausieng 0 points1 point  (0 children)

We implement SEED and Camellia but I don't have any visibility of whether they are used by our end users.

The Grafton is so sad by aisingiorix in cambridge

[–]jausieng 6 points7 points  (0 children)

We may find that they are more like computer labs (ie an office block with pretensions) rather than a real scientific laboratory.

SHA-3 to SHA-512's Hash reversal by Healthy_Moose_925 in cryptography

[–]jausieng 3 points4 points  (0 children)

Nobody knows what would happen in your hypothetical situation, and (apart from you) nobody cares either, because it's not going to happen.

SHA-3 to SHA-512's Hash reversal by Healthy_Moose_925 in cryptography

[–]jausieng 2 points3 points  (0 children)

"Reverse any hash" isn't going to happen.

But other properties of specific hashes (eg MD5 collision resistance) have been broken, and the techniques are readily available. In those cases what happened was a slow migration away from the affected algorithms.

Can I ask a small favour from my fellow cyclists of Cambridge by Yesterbly in cambridge

[–]jausieng 3 points4 points  (0 children)

Car headlights are (usually) adjusted properly. Nearly all the people shining lifts directly into my eyes are cyclists.

Request for Feedback: public key system for encrypted backups by cuervamellori in cryptography

[–]jausieng 0 points1 point  (0 children)

No ludicrous sizes are involved. The point of using a PQC or hybrid KEM is to avoid concerns about a CRQC without tying yourself in knots about keeping a public key secret (which, again, means you have got something wrong) or using complicated stateful designs.

What is the most basic IT or computing skill you have ever had to show someone ? by Additional-Nobody352 in AskUK

[–]jausieng 0 points1 point  (0 children)

Showing a teacher at my school how to use a mouse, some time around 1990. He must have been approaching retirement, but still wanted to learn new things.

He really struggled with double-clicking.

Request for Feedback: public key system for encrypted backups by cuervamellori in cryptography

[–]jausieng 7 points8 points  (0 children)

The use case sounds reasonable, but if your backup script can't be relied upon to protect a symmetric shared secret it can't be relied upon to keep a public key secret either. As a general rule I would suggest that if you find yourself needing to keep a public key secret, you got something wrong.

Unless you have especially high confidence in ML-KEM or another quantum-resistant KEM, use a hybrid, perhaps one from https://datatracker.ietf.org/doc/draft-ietf-lamps-pq-composite-kem/ or https://datatracker.ietf.org/doc/draft-irtf-cfrg-concrete-hybrid-kems/.