Tag: authentication

136 What are the differences between a digital signature, a MAC and a hash? 2012-12-10T12:16:02.220

59 Why does my SSH private key still work after changing some bytes in the file? 2016-01-09T19:15:55.613

42 Signatures: RSA compared to ECDSA 2012-07-12T19:37:30.630

37 RSA encryption with private key and decryption with a public key 2012-03-18T16:53:28.243

23 Why not authenticate full-disk encryption? 2016-11-03T18:23:12.777

22 advances in usability for cryptography/authentication 2011-07-13T14:23:14.083

20 Specification of the Megamos crypto algorithm 2013-07-26T23:54:42.693

16 How does a rolling code work? 2014-07-24T07:51:48.770

15 Why aren't zero-knowledge proofs used in practice for authentication? 2015-04-30T00:09:01.187

14 Why are finite groups used in cryptography? 2018-01-06T12:06:33.893

11 How should I store passwords that need to be available in plain text? 2011-08-07T20:50:22.893

11 What are advantages of using a HMAC over RSA with SHA-1 hashes? 2012-04-13T15:34:21.370

11 Is there a way to make RC4 (ARCFOUR) secure, or is it completely broken? 2012-08-25T12:39:15.343

11 Storing Credentials for a Third Party 2013-08-30T18:03:58.120

11 Shadowed identity in cryptography 2013-12-22T02:20:05.043

10 Can one have an authentic, but repudiable, message without a previously shared secret? 2012-12-12T21:11:45.007

10 How to perform authentication without central server in P2P? 2013-12-20T11:05:25.610

10 How exactly does ASKE (Alpha Secure Key Establishment) in Zigbee work? 2017-02-22T06:19:31.910

9 Need an introduction to SPKI (or "SPKI for dummies") 2011-09-26T09:33:51.513

9 Authenticated DH, what protocols are secure? 2013-06-30T20:53:43.643

9 What current authenticated key exchange standards exist? 2013-06-30T21:26:04.957

9 Authenticated encryption mode for stream cipher? 2013-08-02T12:54:59.147

9 Does data authenticity always, implicitly, provide data integrity? 2014-05-27T12:20:55.543

9 The difference between MAC algorithms and what to use 2015-04-20T08:04:07.423

9 What is the original SKID3 protocol? 2015-08-04T21:12:29.270

9 Historic Authentication Schemes Before Computers 2015-12-10T18:53:50.050

9 Why does the WhatsApp protocol require elaborate computation when verifying user keys? 2016-09-26T18:21:31.873

8 What advantage does facebook's new encrypted access_token have? 2011-09-06T22:23:53.800

8 What is the proper way to use a client nonce? 2011-11-17T04:08:43.267

8 RSA-based authentication and key-agreement protocol 2011-12-11T18:12:56.543

8 Is this a secure implementation of password reset email? 2012-07-20T02:21:15.483

8 Why does SRP-6a use k = H(N, g) instead of the k = 3 in SRP-6? 2012-08-10T17:22:38.007

8 Has GMAC mode a future outside GCM? 2013-06-16T14:05:56.710

8 Is it safe to reuse ECDH asymmetric keys for authentication? 2014-03-23T15:33:57.257

8 Is the HMAC construction really neccessary for a fixed length message? 2015-05-17T09:32:22.613

8 An example of an appropriate use case for AES-CBC encryption without authentication? 2017-02-22T13:33:43.067

7 SHA1 usage for passwords, alternatives and advantages? 2011-09-05T08:45:57.157

7 How can I encrypt + authenticate short strings into similar short ciphertexts? 2011-10-17T10:46:29.520

7 How to authenticate over open channel? 2012-03-27T03:45:52.187

7 Is there any known malleability of scrypt outputs? 2012-04-05T02:57:42.683

7 How can I validate a hashed password if all I have is another hash? 2012-06-27T17:48:29.353

7 HMAC for short messages 2013-01-03T19:08:41.617

7 Security of authenticated encryption modes GCM & CCM 2013-06-15T14:02:06.907

7 Can a salt for a password hash be public? 2014-01-04T15:10:38.257

7 Efficient way to confirm identity 2015-12-17T08:28:46.450

7 zero knowledge proof application 2017-06-07T12:34:36.147

7 Is Encrypt(m||k2, k1) secure authenticated encryption? 2017-07-24T19:02:46.837

7 Security of Carter-Wegman polynomial authenticators, and their concatenation? 2017-12-04T11:03:29.727

7 Should the identity of a sender be verified using additional means, or does a MAC suffice? 2017-12-07T06:28:30.447

6 Authenticating data generated by a particular build of an open source program 2011-08-26T07:15:59.623

6 What is “Implicit Authentication”? 2012-03-04T20:29:09.367

6 Can I use PBKDF2 for authentication and decryption? 2012-08-16T18:33:06.620

6 Is there an authenticated encryption scheme where the recipient can attribute the message to a single sender? 2012-11-19T04:30:24.763

6 Cryptography used for login and signing transactions 2013-07-24T13:46:31.203

6 What is 'Carry-forward verification' defense against MITM? 2013-12-26T18:53:07.287

6 Why is this authentication procedure using Rabin crypto not useful? 2014-01-19T17:43:36.673

6 Where is the authentication tag stored in file encrypted using AES-GCM? 2015-04-26T06:31:46.200

6 Parallel authentication of encrypted data. What AE type to choose? 2015-07-03T22:26:16.107

6 Definition of authenticity 2015-09-10T07:15:07.083

6 When would you increment a nonce and when not? 2016-01-25T17:06:35.503

6 How exactly does certificate based authentication work? 2016-01-29T12:05:43.530

6 Authentication by hardcoding public key in client software 2016-04-26T03:44:45.340

6 Did authentication/signature primitives fall under the Wassenaar Arrangement? 2016-06-03T16:16:47.753

6 Least-weak way to authenticate using only AES ECB/CBC 2016-07-15T18:52:17.160

6 Do I really need to use the same private/public key pair in RSA? 2016-07-21T19:39:37.920

6 Authentication impossible without pre-shared public key 2016-08-25T19:12:08.373

6 How to improve long-term duration of standard checksum for authenticity purposes? 2017-02-28T21:11:34.697

6 Does humanly verifiable one time pad authentication exist? 2017-05-30T01:11:55.453

6 Using a blockchain for secure communication 2018-08-20T18:24:37.387

5 Why are the random exponents so much bigger in the Socialist Millionaire protocol versus Diffie-Hellman key exchange? 2011-12-09T09:04:47.017

5 What authentication techniques can be used by QKD Systems? 2012-10-20T03:01:36.507

5 Efficient Symmetric Mutual Entity Authentication Protocol 2012-12-20T00:47:26.877

5 Convert old and busted password encryption to something sensible 2013-08-03T00:52:55.163

5 Authentication protocols for authenticating devices to a server 2013-08-27T06:42:03.230

5 Diffie-Hellman Key Exchange with Authentication: Man-in-the-Middle query 2014-02-14T23:26:36.417

5 Any use for now-defunct Mt Gox Yubikey? 2014-03-05T15:56:50.607

5 Are HMACs based on hashes with larger bit-lengths also more secure? 2014-07-18T23:13:28.217

5 Implementing CD serial key system 2014-07-28T14:17:15.233

5 Is SRP post-quantum secure? 2014-08-01T16:15:34.250

5 Diffie-Hellman and man-in-the-middle attacks 2014-09-19T08:10:27.917

5 Chess Grandmaster Problem and "Valid" Attacks on Zero-Knowledge Proofs of Identity 2014-10-16T19:30:22.427

5 Is there a signature scheme for the Cramer-Shoup cryptosystem? 2015-07-26T17:19:30.313

5 Fast 128-bit MAC with second preimage resistance? 2015-09-10T11:20:36.307

5 Do low-entropy fingerprints actually make any sense? 2015-11-16T15:59:22.237

5 What is the difference between mutual authentication and unilateral authentication both ways? 2016-02-13T11:30:01.233

5 Key management in Java + Remembering passwords 2017-02-23T20:40:39.610

5 Plausibly deniable authentication for agents on multiple teams 2018-03-17T15:57:52.617

5 Using nested signatures to trust public key of inner signatures 2018-07-11T10:14:37.537

5 How is ZKPP better than signing nonces? 2018-09-25T00:54:27.380

5 Login security and plaintext of a password stored in Argon2i to derive a key via halite safe? 2018-09-26T06:22:16.527

4 Is public-key cryptography the only option in this scenario? 2011-08-18T01:55:14.590

4 X.509 CSR: Why does CA remove signature? 2012-03-06T13:26:59.550

4 Efficient and stateless anti-forgery method 2012-04-06T00:57:37.257

4 How did LinkedIn "salt" all their passwords? 2012-06-10T05:29:45.053

4 Is there another resource for Carter-Wegman-style message authentication? 2012-08-25T01:59:00.513

4 OpenPGP/X.509 bridge: how to verify public key? 2013-11-07T09:29:01.973

4 Why can an RSA signature be authenticated ONLY with the signer's public key? 2013-12-03T17:21:56.660

4 Why have Nonce and why encrypt everything in step 2 for Needham-Schroeder? 2014-01-09T23:00:20.750

4 Encrypting a TCP connection between two unknown nodes 2014-01-19T10:51:43.107