First  |  Prev |  Next  |  Last
Pages: 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53
Q: SAC
Hi, Maybe a rather dumb question: If the property of non-linearity can be disregarded, is there a way of obtaining a n-bit (n>2) bijective function satisfying SAC with low computational cost? Thanks, M. K. Shen ... 5 Oct 2009 10:09
RSA key size and safety
biject <biject.bwts(a)gmail.com> wrote: On Aug 26, 8:48?am, pubkeybreaker <pubkeybrea...(a)aol.com> wrote: On Aug 26, 10:41?am, George Orwell <nob...(a)mixmaster.it> wrote: http://www.keylength.com/ Has anyone seen these numbers? They're calculations for the estimated safety period for d... 8 Sep 2009 14:50
ready to use javascript cryptopage - crypto-js
Carsten Krueger wrote: Hi, I found a very nice javascript cryptopage named crypto-js http://code.google.com/p/crypto-js/ License: New BSD ... AES.encrypt creates random IV, encrypts in OCB mode, hash passphrase with PBKDF2, saves IV+message bases64 encoded Are you sure you don't mean CBC ... 3 Sep 2009 07:53
A chosen plaintext attack for XXTEA
Just something I found a while ago. I'll write a paper if I can bother. The structure of XXTEA is basically m[i] += f(m[i-1], m[i+1], ...) The idea is to find a delta so that f(m[i-1], m[i+1], ...) == f(m[i-1]+delta, m[i+1], ...) and f(m[i-1], m[i+1], ...) == f(m[i-1], m[i+1]+delta, ...) hold with ... 4 Dec 2008 08:30
Rolex Oyster Perpetual Cosmograph Daytona Mens Watch 116523-WDO Collection
Rolex Oyster Perpetual Cosmograph Daytona Mens Watch 116523-WDO Collection Watches Collection Site : http://www.watches-collection.com/ Rolex Oyster Perpetual Cosmograph Daytona Mens Watch 116523-WDO View Full : http://rolex.watches-collection.com/Rolex-Oyster-Perpetual-Cosmograph-Daytona-Mens-Watch-116523-WDO.h... 12 Nov 2008 04:40
Unbreakable code using XOR for one time pad?
Encoding data using the XOR function against a "one time pad" of the same or longer length of the file seems to yield an unbreakable cypher message since there is more than one solution using different keys. For example, the message "The quick brown fox" can be encoded by XORing each character against a key of sa... 22 Nov 2008 22:31
Cipher challenge
On 10/11/2008 04:14 PM, simon wike sent: A little off topic I know But is anyone here good at code cracking? I have been trying for weeks to crack these 2 codes and cannot even id them 1st is 4675121931518313213557921424396310162643701118294877 2nd is 43701624*753943433914*26311243213924 ... 11 Oct 2008 19:44
AES CTR Mode
Hi, AES Counter mode (AES-CTR) is discussed in RFC 3686, But, i am unable to find a sample source code just as in AES CMAC discussion in RFC 4493. Is there any similar references for AES CTR ? Can anyone provide me with a link for an opensource implementation of AES CTR? Thx in advans, Karthik Balaguru ... 7 Oct 2008 04:10
Merry Christmas 7
This specification is not copyrighted or patented. I intend it to be public domain for free distribution. The data encryption technique is useful for small data streams, with significant bloat. If you are unfamiliar with the signal processing concepts of auto and cross correlation, then you should read up on them. ... 1 Sep 2008 11:05
What is the next Prime that is 3 mod 4 from this one?
Hi, I have this prime (base 10): 104438888141315250667960271984652954583126906099213500902258875644433817202232\ 269071044404666980978393011158573789036269186012707927049545451721867301692842\ 745914600186688577976298222932119236830334623520436805101030915567415569746034\ 71769463940765351572849948952848216337... 5 Sep 2008 00:19
First  |  Prev |  Next  |  Last
Pages: 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53