Which block cipher parameters should be kept secret?Converting a stream cipher into a block cipherIs SHA-256 secure as a CTR block cipher?What (precisely) is a block cipher?Is a tweakable block cipher still considered deterministic in nature?Turning a 64 bit block cipher into a 128 bit block cipherSecurity of a parallelizable block cipher modeShould I use a self-designed Block Cipher Mode of Operation?A block cipher whose key changes after each block
Account creation and log-in system
Does Mage Hand give away the caster's position?
Compare FEM mesh with the mesh created within Mathematica
Which version of the Pigeonhole principle is correct? One is far stronger than the other
How can I create folders in folders in terminal
Is it possible that the shadow of The Moon is a single dot during solar eclipse?
Microservices and Stored Procedures
Can a business put whatever they want into a contract?
Cemented carbide swords - worth it?
Is it safe to put a microwave in a walk-in closet?
Why would a fighter use the afterburner and air brakes at the same time?
How do rulers get rich from war?
Did slaves have slaves?
What was the deeper meaning of Hermione wanting the cloak?
What happens when I use Drawmij's Instant Summons on Dimensional Shackles?
EU compensation - fire alarm at the Flight Crew's hotel
Are there any instances in Tanach of Lashon Hara said purely for non-constructive purposes?
Why do we need to use transistors when building an OR gate?
Is this adjustment to the Lucky feat underpowered?
All numbers in a 5x5 Minesweeper grid
Why are there two bearded faces wearing red hats on my stealth bomber icon?
Who are the people reviewing far more papers than they're submitting for review?
Simple way to decompose a lists in a certain way?
Amiga 500 OCS/ECS vs Mega Drive VDP
Which block cipher parameters should be kept secret?
Converting a stream cipher into a block cipherIs SHA-256 secure as a CTR block cipher?What (precisely) is a block cipher?Is a tweakable block cipher still considered deterministic in nature?Turning a 64 bit block cipher into a 128 bit block cipherSecurity of a parallelizable block cipher modeShould I use a self-designed Block Cipher Mode of Operation?A block cipher whose key changes after each block
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;
$begingroup$
Which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?
block-cipher
New contributor
$endgroup$
add a comment
|
$begingroup$
Which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?
block-cipher
New contributor
$endgroup$
add a comment
|
$begingroup$
Which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?
block-cipher
New contributor
$endgroup$
Which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?
block-cipher
block-cipher
New contributor
New contributor
edited 8 hours ago
Ella Rose♦
17.4k4 gold badges45 silver badges86 bronze badges
17.4k4 gold badges45 silver badges86 bronze badges
New contributor
asked 9 hours ago
EmilyEmily
161 bronze badge
161 bronze badge
New contributor
New contributor
add a comment
|
add a comment
|
1 Answer
1
active
oldest
votes
$begingroup$
In you opinion which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?
I believe that it is essential that you keep the key secret.
If there is any other aspect of the cipher that you must keep secret (that is, you become insecure if it is revealed), then your cipher is 'broken'.
We can assume that the attacker can learn any long term aspect of your cipher implementation, such as the cipher name, mode of operation, key length. There are a number of possible ways he might learn it, such as an employee accidentally (or deliberately) leaking it, or if the attacker just obtains your implementation and dissects it. Hence, for security, we want to depend solely on something that we update routinely (such as the key). If the attacker learns the key, that limits the damage (as he can decrypt the traffic encrypted with that key, but nothing after we update the key. This idea is referred to as Kerckhoff's principle
Now, you list the IV; that is typically updated constantly. On the other hand, we generally use it to refer to information that need not be secret. If it does have to be secret, then it really is part of the key, and should be considered that way.
$endgroup$
add a comment
|
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "281"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/4.0/"u003ecc by-sa 4.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Emily is a new contributor. Be nice, and check out our Code of Conduct.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f74345%2fwhich-block-cipher-parameters-should-be-kept-secret%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
$begingroup$
In you opinion which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?
I believe that it is essential that you keep the key secret.
If there is any other aspect of the cipher that you must keep secret (that is, you become insecure if it is revealed), then your cipher is 'broken'.
We can assume that the attacker can learn any long term aspect of your cipher implementation, such as the cipher name, mode of operation, key length. There are a number of possible ways he might learn it, such as an employee accidentally (or deliberately) leaking it, or if the attacker just obtains your implementation and dissects it. Hence, for security, we want to depend solely on something that we update routinely (such as the key). If the attacker learns the key, that limits the damage (as he can decrypt the traffic encrypted with that key, but nothing after we update the key. This idea is referred to as Kerckhoff's principle
Now, you list the IV; that is typically updated constantly. On the other hand, we generally use it to refer to information that need not be secret. If it does have to be secret, then it really is part of the key, and should be considered that way.
$endgroup$
add a comment
|
$begingroup$
In you opinion which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?
I believe that it is essential that you keep the key secret.
If there is any other aspect of the cipher that you must keep secret (that is, you become insecure if it is revealed), then your cipher is 'broken'.
We can assume that the attacker can learn any long term aspect of your cipher implementation, such as the cipher name, mode of operation, key length. There are a number of possible ways he might learn it, such as an employee accidentally (or deliberately) leaking it, or if the attacker just obtains your implementation and dissects it. Hence, for security, we want to depend solely on something that we update routinely (such as the key). If the attacker learns the key, that limits the damage (as he can decrypt the traffic encrypted with that key, but nothing after we update the key. This idea is referred to as Kerckhoff's principle
Now, you list the IV; that is typically updated constantly. On the other hand, we generally use it to refer to information that need not be secret. If it does have to be secret, then it really is part of the key, and should be considered that way.
$endgroup$
add a comment
|
$begingroup$
In you opinion which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?
I believe that it is essential that you keep the key secret.
If there is any other aspect of the cipher that you must keep secret (that is, you become insecure if it is revealed), then your cipher is 'broken'.
We can assume that the attacker can learn any long term aspect of your cipher implementation, such as the cipher name, mode of operation, key length. There are a number of possible ways he might learn it, such as an employee accidentally (or deliberately) leaking it, or if the attacker just obtains your implementation and dissects it. Hence, for security, we want to depend solely on something that we update routinely (such as the key). If the attacker learns the key, that limits the damage (as he can decrypt the traffic encrypted with that key, but nothing after we update the key. This idea is referred to as Kerckhoff's principle
Now, you list the IV; that is typically updated constantly. On the other hand, we generally use it to refer to information that need not be secret. If it does have to be secret, then it really is part of the key, and should be considered that way.
$endgroup$
In you opinion which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?
I believe that it is essential that you keep the key secret.
If there is any other aspect of the cipher that you must keep secret (that is, you become insecure if it is revealed), then your cipher is 'broken'.
We can assume that the attacker can learn any long term aspect of your cipher implementation, such as the cipher name, mode of operation, key length. There are a number of possible ways he might learn it, such as an employee accidentally (or deliberately) leaking it, or if the attacker just obtains your implementation and dissects it. Hence, for security, we want to depend solely on something that we update routinely (such as the key). If the attacker learns the key, that limits the damage (as he can decrypt the traffic encrypted with that key, but nothing after we update the key. This idea is referred to as Kerckhoff's principle
Now, you list the IV; that is typically updated constantly. On the other hand, we generally use it to refer to information that need not be secret. If it does have to be secret, then it really is part of the key, and should be considered that way.
edited 5 hours ago
kelalaka
10.7k3 gold badges28 silver badges55 bronze badges
10.7k3 gold badges28 silver badges55 bronze badges
answered 8 hours ago
ponchoponcho
99.2k3 gold badges161 silver badges259 bronze badges
99.2k3 gold badges161 silver badges259 bronze badges
add a comment
|
add a comment
|
Emily is a new contributor. Be nice, and check out our Code of Conduct.
Emily is a new contributor. Be nice, and check out our Code of Conduct.
Emily is a new contributor. Be nice, and check out our Code of Conduct.
Emily is a new contributor. Be nice, and check out our Code of Conduct.
Thanks for contributing an answer to Cryptography Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
Use MathJax to format equations. MathJax reference.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f74345%2fwhich-block-cipher-parameters-should-be-kept-secret%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown