RSA Proof using CRTs there's a lot of mathematical proofs of the original RSA algorithm around. However I have not found one that describes the 2nd alternative using prime factors or CRT. Could someone please shed some light on the mathematics behind the 2nd method as described in PKCS#1 v2.0 and above? Assuming that p, q, dP, dQ,... 24 Jun 2010 13:01
Scalar methods in the XY plane. In the context of sporadic mapping of plaintext to integer points in three-dimensional space I have recently stated that the methodology to be used is the well known methods of vector algebra to which I have added my own invention of vector factoring (http://www.adacrypt.com - see "Factoring of Vectors in Vecrtor C... 23 Jun 2010 17:18
What's encoding? what's encoding used in this code: %PDF-1.5 %�?<� 1 0 obj<</T#79p#65/#43at#61#6c#6f#67/O#75#74#6c#69n#65s 2 0 R/Pa#67e#73 3 0 R/Op#65n#41#63#74#69o#6e 5 0 R>>endobj 2 0 obj<</#54ype/O#75tl#69#6ee#73/C#6f#75n#74 0>>endobj 3 0 obj<</Type/#50ag#65#73/K#69ds[4 0 R]/Co#75#6e#74 1>>endobj 4 0 obj<</#54#79#70e/Pag#6... 22 Jun 2010 14:56
Encrypting odd sized buffers Is there a symmetric block encryption algorithm that can encrypt a 108 bit buffer using a key and output a 108 bit buffer? I'd like to feed it a sequential range of numbers (1001,1002,1003,1004...) and have the algorithm generate for me a pseudo-random sequence of numbers that are guaranteed to be unique. ... 26 Jun 2010 21:45
Which Crypto League to bat in for Future. Advances in computer science will most certainly dictate the classes of cryptography that may be forced on us in the future and whether we like it or not we may not have any say in the matter of what transpires as the way forward in the future of the cryptography industry. The case has been made by me in frequen... 21 Jun 2010 14:41
Call for Papers: International Conference on Electrical Engineering and Applications ICEEA 2010 On Mon, 21 Jun 2010 02:08:32 -0700 (PDT), IMECS 2008 <iaeng_publication_b(a)iaeng.org> wrote: Call for Papers: International Conference on Electrical Engineering and Applications ICEEA 2010 That's more like it, but the group list is pretty lame. Simply posting links would likely yield better results. ... 21 Jun 2010 05:52
Call for Papers: International Conference on Electrical Engineering and Applications ICEEA 2010 Call for Papers: International Conference on Electrical Engineering and Applications ICEEA 2010 CFP: International Conference on Electrical Engineering and Applications ICEEA 2010 Draft Paper Submission Deadline: 2 July, 2010 Camera-Ready Papers Due & Registration Deadline: 30 July, 2010 ICEEA 2010: San Francis... 21 Jun 2010 05:52
An URL of news on Gelfond's hypothesis http://www2.cnrs.fr/en/1732.htm?debut=8 ... 19 Jun 2010 13:28
How to handle initialization vectors ? Hello, first post on sci.crypt, yay ! So, here is my problem : I have some cipher (AES, if that is relevant), that needs to be used in counter (CTR) mode. I wish to implement this myself rather than using any prebuilt library (note that this is a coding exercise, it is not going to be used in any high- security... 21 Jun 2010 05:52
The Final Anlysis. Let the encryption of a character be represented by a point in the XY plane. Let the cipher text be some transformation of the character to this point in the XY plane. A basic tenet now is that the cipher text can only be theoretically unbreakable if it is sporadically mapped and the resultant point is one of som... 20 Jun 2010 10:11 |