Cryptography Definition and 67 Threads

  1. S

    Creating Entropy For Cryptographic Purposes

    Hello, My name is Mason C. Turner and I work in the cybersecurity field. My background includes both military communications as well as private sector experience. According to the laws of physics, to the best of my understanding information and energy are directly interchangeable in a...
  2. shivajikobardan

    Comp Sci Solve ax+by=GCD(a,b) for RSA Algorithm Cryptography

    It starts at 6:16 It's the part where he's pointing his hand in this picture. I didn't get it although it's pretty mechanical, so I'd like to learn that technique as this is really useful in RSA algorithm(rather than having to memorize some values). I've been searching for a method like that...
  3. A

    MHB Accelerate Zero-Knowledge Cryptography with ZPrize!

    I would like to invite your members to participate in the ZPrize competition. ZPrize is an industry-wide competition, modeled after the XPrize, to accelerate zero-knowledge cryptography. We have over 39 leading zero-knowledge technology companies contributing to this effort donating $7 million...
  4. Rzbs

    I Space Group Symmetry: What is F d3m Spinel Structure?

    What does mean spinel structure has F d3m space group? I know F is for face centred cubic, 3 is 3-fold symmetry and m is mirror, but I don't know what means "d"?
  5. S

    Nobel prize in physics for quantum cryptography?

    Is it likely that this year's Nobel prize could be awarded to the field of quantum cryptography with Charles H Bennet, Gilles Brassard and Artur Ekert as possible nobel laureate candidates?
  6. D

    Cryptography - coin flipping protocol

    Conditions of the problem: y =/= a^2 (mod pq) -y =/= a^2 (mod pq) p = 3 (mod 4) q = 3 (mod 4) (a) We assume y is both square (mod p) and (mod q). Then, b^2 = y (mod p) b^2 = y (mod q) b^2 = y + pk b^2 = y + qr pk = qr ? (should we assume b is the same between the two equations?) (b) -y = d^2...
  7. D

    Cryptography problem involving prime numbers

    Here is my attempt When we raise both sides to the power (p-1)/2, we get x^(p-1)= -1^[(p-1)/2](modp) Looking at p=3(mod4), the possible values of p are {3, 7, 11, 19, 23, 31...}. Putting these values of p into (p-1)/2 we get odd integers. {1, 3, 5, 9, 11, 15...}. So we have x^(p-1) =...
  8. S

    Comp Sci RSA system with p=17, q=11 and e=3. Find m corresponding to c=156

    OFFICIAL SOLUTION: d=e^(-1) mod 160=107 mp= c^(d) mod p=7 mq:=c^(d) mod q=7 MY THOUGHTS: I understand how d = 107, but I got that by using m = (17-1)(11-1) = 160. What I don't understand is the next two lines (from the official solution). I am aware of the P = C^d mod n (decryption) formula...
  9. N

    What is the role of Eve in a Man in the Middle attack?

    I have some curiosity about MIM attack in a paper that I have been found before. The diagram shows the MIM attack between Alice and Bob: I found that the sentences state: "We consider that the transmittance of the quantum channel is t. If Alice sends pulses with a mean photon number of N...
  10. V

    MHB How to Use Elliptic Curve Cryptography to Find Inverses and Points on the Curve?

    May I know how to solve the equation as below: (1) y2 = x3 + x + 1 mod 17 Finding Inverses Finding Points on the Curve (2) y2 = x3 + 3x + 1 mod 13 Finding Inverses Finding Points on the Curve
  11. H

    Number Theory Cryptanalysis Books: Prerequisites for Beginners

    Hey guys, I just bought the book Elementary Cryptanalysis: A Mathematical Approach by Abraham Sinkov, yet before I start it, I would like to know if there are any prerequisites I should know about as I am 16 and I still haven't even taken all of high school mathematics although I am self...
  12. The Inner Workings of an Enigma Machine

    The Inner Workings of an Enigma Machine

    Ever wonder how the famous Enigma Machine worked? Mathematician and cryptography expert Dr. James Grime takes one apart to demonstrate how it created complex codes.
  13. ertagon2

    MHB Cryptography: RSA Message decryption

    I've been trying to solve this question for quite a while now. I watched a ton of videos on RSA. But whenever I try to solve it I get weird answers. Can some pls give me a hint or their method of solving it. An answer to the question also would be fine.
  14. T

    Learning number theory for cryptography

    Hi everyone, I am trying to learn the underlying number theory concepts behind cryptography, and I was wondering if anyone knows of good resources for learning about number theory as applied to cryptography. I was hoping to practice writing proofs as well. Thanks!
  15. J

    Cryptographic attacks as minimization of degree 4 polynomial

    Cryptography is based on reason-result chains like hash functions: which are inexpensive to propagate in the intended direction, but seem hard to reverse. However, decomposing them into satisfaction of simple (direction-agnostic) relations like 3-SAT clauses, may bring a danger of existence of...
  16. T

    I Can E(M,K) = C Replace Ek(M) = C in Cryptography Notation?

    I was just reading a cryptography book and have a question about something the author states I highlighed the statement in yellow and included a pictures. So I was wondering if the function could be written as E(M,K) = C instead of Ek(M)=C since the fact that E is dependent on K. If not why...
  17. Zafa Pi

    I One Way vs. Entangled Cryptography

    In a recent article (I've lost the reference, but it doesn't matter) it said that employing entangled photons is superior to the usual one way transmission of photons from Alice to Bob for creating a one time pad. It gave no justification for this claim. Can anyone provide me with one?
  18. S

    Is DEHP a kind of Multivariate hard problem?

    Please correct me if I am wrong. To my understanding , given a '##m##' multivariate set of equations in '##n##' variables in a integer field '##F##' is hard to solve, even in case of ##MQ(multiquadratic)## usually with field having characteristic as '##2##'. Where in case of ##DEHP(Diophatine...
  19. C

    What can be different options for a MS in applied Math ?

    Where all can I apply to pursue a MS in applied Math after acquiring a BS in Math as I am not interested in doing a PhD.
  20. M

    MHB Cryptography Topics: Electronic Voting, Lattice Reduction | Recommendation

    Hey! :o I am taking the course cryptography this semester and I will have a presentation at the end of the semester. Could you give me some information about the following topics: - An electronic voting system - Lattices and lattice reduction What are these topics about?? Which one...
  21. ant0n

    How would observation of the state of qubits affect them?

    Firstly, I apologise for any lack of understanding, incorrect assumptions or misinterpretations of the very little I know about physics, quantum mechanics & quantum computing. I am not an academic, scientist or mathematician, but a software engineer with an interest in quantum computing and...
  22. qpwimblik

    Cryptography indexing the hash and primeality testing

    +David West Heres What I got as far as the hash is concerned. Heres my indexing functions First We Have this function for fast indexing of the hash. ZequebaHashB[bvc_, yvc_, avc_] := {Drop[Flatten[Reap[ Module[{a34 = bvc, a35 = yvc, rt2 = avc, z75, zler}, z75 = 1; zler...
  23. R

    Interested in Algebraic Geometry and Mathematical Cryptography? Let's Connect!

    I'm finishing a B.S. in math and have been getting a bit more into physics lately. I'm on track for a second major in either physics or Russian, but not super concerned about finishing - I'm applying to grad programs in pure math. I'm particularly interested in algebraic geometry, combinatorics...
  24. M

    MHB Cryptography: What is it & What Do You Need to Know?

    Hey! :o Could you give me some information about the subject Cryptography?? What is it about?? (Wondering) Are there required knowledges?? (Wondering)
  25. chisigma

    MHB A question on cryptography....

    The recent case 'datagate' suggests me to prose to You a question I didn.t resolve completely. Let's suppose that we have a plaintext $p_{n}$ and we code it with a key $k_{n}$ generating a chipertext... $\displaystyle c_{n} = p_{n} + k_{n}\ (1)$ ... where the sum is modulo some 'large...
  26. S

    Some questions about cryptography

    Hi I am a first year student studying mathematics. I have been experimenting with various subjects to find my thing, and I think I am interested in discrete mathematics, particulary in number theory and cryptography. 1) But it seems like, there aren't many companies that are explicitly...
  27. M

    Can Variable Message Lengths Invalidate Cryptographic Indistinguishability?

    Prove that the following definition cannot be satisfied if Π can encrypt arbitrary-length messages and the adversary is not restricted to outputting equal-length messages in experiment PrivKeavA,∏. A prive-key encryption scheme ∏=(Gen, Enc, Dec) has indistinguishable encryptions in the...
  28. F

    Cryptography, public key and private key

    Hello Forum, If Alice wants to send a secret message to Bob, she has to encrypt it first to keep the message secure. Who issues the public key in this case and who uses the private key? thanks fisico30
  29. M

    What are some applications of prime numbers other than cryptography

    I was just wondering what are some applications of prime numbers other than cryptography? Also i heard that there is no certain *equation or prediction of Prime numbers? For example, there is no way to explain prime numbers with an equation. What happens if one was able to find one...
  30. P

    Which Mathematicians Pioneered Prime Numbers for Cryptography?

    Hello, This may seem like a random question but I'm doing a essay on cryptography and I'm wondering if anyone could tell me who was the mathematician(s) that done the original work in prime numbers that lead to the development of cryptography and the RSA and whatnot. Sorry if this is vague...
  31. S

    Which Mathematician's Theorem Linked Prime Numbers to Cryptography?

    Hello, this is rather vague but I had a lecture around a year ago about prime numbers and how a mathematician (Hardy or Euler?) found a proof to do with prime numbers and then this lead on to cryptography and internet security... That's all I can particularly remember but I'm wondering on...
  32. N

    Help with Cryptography | Read & Prerequisites

    Dears, Hope everything is going fine with all of you; I hold a Bsc in communications and electronics engineering and a Diploma in Information security; I want to study cryptography, and I decided to have a Msc in Maths for this reason; Kindly, if you can recommend what books to read...
  33. D

    Need a Comprehensive Cryptography Text

    As per the title, I need a cryptography book that does not shy away from math. To me it seems like many crypto books are scared of presenting the theory from a mathematician's perspective. I was recommended Cryptography : Theory and Practice by Stinson, can anyone comment on it? Any help is...
  34. A

    Linear Algebra Applications: Cryptography

    If any of you guys are seeing or saw this app. for linear algebra in your classes, I could use a hand... Homework Statement A Hill 2-cipher is intercepted that starts with the pairs SL HK Find the deciphering and enciphering matrices, given that the plaintext is known to start with the...
  35. D

    Physics Research in quantum cryptography

    Hello! I'm an undergraduate in physics engineering student who's thinking about his future. I would like to work in the field of quantum cryptography or communication with light, or -more or less- to do the same kind of research as Anton Zeilinger. Which kind of MSc and PhD should I take and...
  36. P

    PhD in Cryptography: Private Sector Career Advice

    So I'm getting to the point now where I need to start looking at graduate schools in mathematics. Being a pure math major my original plan has always been to get a phd in pure math and from there attempt to break into academia. But the more I learn about the current academic climate, the more...
  37. R

    Cryptography - transposition cipher

    Suppose m = 6 was encoded with ther permutation \pi = (13)(2546) Decrypt:- EESLSHSALSESLSHBLEHSYEETHRAEOS It turns out that the inverse of \pi is how you decrypt the message and apply the inverse permutaion which is (31)(6452) And the plaintext is she sells seashells... However I am...
  38. R

    Cryptography - modulo arithmetic

    Finding log3(4) in Z(11).. Is that the same as finding log3(4)(mod11)?
  39. M

    Quantum Cryptography Project Help.

    Hello Every one! I am an electric engineering student, Doing my graduation project on the topic of quantum cryptography, i have read the literature and i think that i understand the topic quite well. In the literature review i am talking about classical cryptography, QKD, BB84 protocol, EPR...
  40. M

    What classes do I need to major in Cryptography?

    What classes do I need to major in Cryptography?
  41. M

    Quantum Cryptography: Classes & Degree Programs

    If I want to go into quantum cryptography, what classes should I take and what colleges are there that offer this degree? Thank you so much!
  42. F

    How Do You Solve an Affine Cipher with Given Mappings?

    Homework Statement 7) You are attempting to break an affine cipher. You believe that the ciphertext ‘a’ maps to the plaintext letter ‘E’ and that the ciphertext ‘v’ maps to the plaintext ‘T’. Determine the encryption function used based on these two pieces of information. Homework Equations...
  43. K

    Hackers exploit quantom cryptography

    Simple, ingenious, and effective. http://www.nature.com/news/2010/100829/full/news.2010.436.html http://www.youtube.com/watch?v=VMdf8Xwxvnw&p=5E45CC761E979839&index=2&playnext=2
  44. L

    How can I break into the NSA's cryptography field before I graduate?

    So here is my situation: I am planning on graduating March 2011 with a B.S in Mathematics, as well as a B.S. in Physics. My interest in physics has waned greatly, and my desire to go to grad school for either subject is non-existent right now. I took a look at the NSA, as I heard they hire...
  45. G

    Is n Prime if Zero Products and Unique Solutions Exist in Modulo n Arithmetic?

    I'm having some trouble addressing the following two questions in a text I am going through: 1. Show that n is a prime number iff whenever a,b ∈ Zn with ab=0, we must have that a=0 or b=0. 2. Show that n is a prime number iff for every a,b,c ∈ Zn satisfying a not =0, and ab=ac, we have...
  46. E

    What Degree Leads to Compsci/ Security/ Cryptography

    What undergraduate degree will best prepare a person for one of these fields (comp security/cryptography)? - math - compsci ...out of the two, which one would better benefit me if I pursue a PhD with. I'm most interested in computer security and cryptography. Cryptography is...
  47. M

    [cryptography] quantum key distribution

    I'm reading up on quantum key distribution schemes, mostly: BB84, B92 and the EPR Protocol, and I'm having some problems relating them. Is it correct to say that BB84 is a special case of B92(with extra specific states)? Is it also safe to say that both BB84 and B92 are special cases of EPR...
  48. L

    What Are the Best Beginner Resources for Learning Quantum Cryptography?

    Hi, Can anyone recommend some good websites, or preferably books, which give an introduction to Quantum Cryptography? I'm looking for a level aimed at first year undergrad level, assuming little to no prior knowledge really, except for A-level quantum physics. Any suggestions would be very...
  49. T

    Programming needed for Cryptography

    I was wondering, what types of programming languages are used in the field of Cryptography? I'm a math major with a working knowledge of C/C++, Java, and Python. Would it be worthwhile to learn some assembly languages? Should I learn more high level languages? Or, should I hone my skills in the...
  50. M

    Debunking the Hype: The Truth About Quantum Cryptography

    I am extremely skeptical about quantum cryptography. First all of the articles I have read about the technology use the same mathematical concepts to encrypt and decrypt a message. Nothing about quantum cryptography actually changes physical characteristics of math. That is obvious. There...
Back
Top