Cryptography Stack Exchange by Kiwix

Q&A for software developers, mathematicians and others interested in cryptography

Most popular questions

277 Should we MAC-then-encrypt or encrypt-then-MAC? 2011-07-19T21:39:56.770

139 Time Capsule cryptography? 2011-06-22T17:47:53.637

134 How much would it cost in U.S. dollars to brute force a 256 bit key in a year? 2011-11-08T10:51:55.030

129 Why is writing your own encryption discouraged? 2017-01-25T18:19:44.737

127 Should we trust the NIST-recommended ECC parameters? 2013-09-09T03:07:52.923

119 Why is elliptic curve cryptography not widely used, compared to RSA? 2011-11-15T06:19:31.803

114 What are the differences between a digital signature, a MAC and a hash? 2012-12-10T12:16:02.220

102 Why can't we reverse hashes? 2017-04-06T16:25:11.253

85 How big an RSA key is considered secure today? 2012-03-03T02:51:20.540

83 What is the new attack on SHA-1 "SHAttered" and how does it work? 2017-02-23T13:40:35.063

82 Can you help me understand what a cryptographic "salt" is? 2012-01-30T14:01:52.930

80 How should I calculate the entropy of a password? 2011-08-11T06:03:30.270

78 Is modern encryption needlessly complicated? 2011-09-02T03:16:42.643

77 How is CipherCloud doing homomorphic encryption? 2012-08-25T15:09:14.477

75 Guarding against cryptanalytic breakthroughs: combining multiple hash functions 2011-07-29T15:52:46.960

71 How can I generate large prime numbers for RSA? 2011-07-13T10:10:49.897

71 Is AES-256 weaker than 192 and 128 bit versions? 2012-10-19T22:02:16.503

71 Should we sign-then-encrypt, or encrypt-then-sign? 2012-11-22T16:55:00.610

68 Layman's explanation of encryption backdoors 2016-02-17T12:11:17.360

67 Taking advantage of one-time pad key reuse? 2011-07-13T03:24:02.727

64 In end-to-end encryption, doesn't the server need to be trusted? 2017-12-19T14:30:35.733

63 Should I use ECB or CBC encryption mode for my block cipher? 2011-07-21T13:19:43.667

62 What is the main difference between a key, an IV and a nonce? 2012-10-05T08:20:27.690

61 What are the practical differences between 256-bit, 192-bit, and 128-bit AES encryption? 2011-07-12T19:44:46.490

60 Are there two known strings which have the same MD5 hash value? 2011-12-11T08:57:56.650

60 Technical feasibility of decrypting https by replacing the computer's PRNG 2013-07-14T02:39:37.367

60 Why does the FBI ask Apple for help to decrypt an iPhone? 2016-02-18T11:38:29.543

58 What is the "Random Oracle Model" and why is it controversial? 2011-09-30T15:38:37.803

57 How are primes generated for RSA? 2012-03-01T12:54:31.007

56 Why does my SSH private key still work after changing some bytes in the file? 2016-01-09T19:15:55.613

55 How can I use asymmetric encryption, such as RSA, to encrypt an arbitrary length of plaintext? 2011-07-12T19:27:47.580

53 How does one attack a two-time pad (i.e. one time pad with key reuse)? 2012-03-31T22:29:02.540

53 What is the difference between PKCS#5 padding and PKCS#7 padding 2013-07-04T21:18:51.007

50 How secure is AES-256? 2012-04-01T16:15:54.610

50 How does RSA signature verification work? 2013-08-21T11:47:16.693

50 Do these new insights into prime numbers affect encryption security? 2016-03-14T21:54:34.897

49 Hashing or encrypting twice to increase security? 2011-09-25T06:56:17.897

47 What is the difference between CBC and GCM mode? 2012-04-08T23:20:36.817

47 "SHA-256" vs "any 256 bits of SHA-512", which is more secure? 2012-07-06T05:03:41.510

47 Timing attack and good coding practices 2016-11-21T06:52:41.787

46 What are the advantages of TOTP over HOTP? 2012-03-29T23:34:53.963

46 One Encryption, Many Decryption Keys 2016-08-16T19:23:23.580

45 What makes a hash function good for password hashing? 2011-07-12T19:59:44.993

44 Google is using RC4, but isn't RC4 considered unsafe? 2011-09-29T05:30:51.427

44 What is a "freestart collision"? 2015-10-08T09:14:24.063

43 Why use an Initialization Vector (IV)? 2011-09-20T14:11:42.383

43 Who uses Dual_EC_DRBG? 2013-09-05T20:58:50.193

43 Signal vs Telegram in terms of protocols? 2015-12-20T21:53:23.500

42 What are the benefits of the two permutation tables in DES? 2011-07-12T18:44:18.650

42 How does asymmetric encryption work? 2011-08-03T10:18:42.333

Tags

  All tags