Which block cipher parameters should be kept secret?Converting a stream cipher into a block cipherIs SHA-256 secure as a CTR block cipher?What (precisely) is a block cipher?Is a tweakable block cipher still considered deterministic in nature?Turning a 64 bit block cipher into a 128 bit block cipherSecurity of a parallelizable block cipher modeShould I use a self-designed Block Cipher Mode of Operation?A block cipher whose key changes after each block

Account creation and log-in system

Does Mage Hand give away the caster's position?

Compare FEM mesh with the mesh created within Mathematica

Which version of the Pigeonhole principle is correct? One is far stronger than the other

How can I create folders in folders in terminal

Is it possible that the shadow of The Moon is a single dot during solar eclipse?

Microservices and Stored Procedures

Can a business put whatever they want into a contract?

Cemented carbide swords - worth it?

Is it safe to put a microwave in a walk-in closet?

Why would a fighter use the afterburner and air brakes at the same time?

How do rulers get rich from war?

Did slaves have slaves?

What was the deeper meaning of Hermione wanting the cloak?

What happens when I use Drawmij's Instant Summons on Dimensional Shackles?

EU compensation - fire alarm at the Flight Crew's hotel

Are there any instances in Tanach of Lashon Hara said purely for non-constructive purposes?

Why do we need to use transistors when building an OR gate?

Is this adjustment to the Lucky feat underpowered?

All numbers in a 5x5 Minesweeper grid

Why are there two bearded faces wearing red hats on my stealth bomber icon?

Who are the people reviewing far more papers than they're submitting for review?

Simple way to decompose a lists in a certain way?

Amiga 500 OCS/ECS vs Mega Drive VDP



Which block cipher parameters should be kept secret?


Converting a stream cipher into a block cipherIs SHA-256 secure as a CTR block cipher?What (precisely) is a block cipher?Is a tweakable block cipher still considered deterministic in nature?Turning a 64 bit block cipher into a 128 bit block cipherSecurity of a parallelizable block cipher modeShould I use a self-designed Block Cipher Mode of Operation?A block cipher whose key changes after each block






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;








3












$begingroup$


Which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?










share|improve this question









New contributor



Emily is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






$endgroup$




















    3












    $begingroup$


    Which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?










    share|improve this question









    New contributor



    Emily is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.






    $endgroup$
















      3












      3








      3





      $begingroup$


      Which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?










      share|improve this question









      New contributor



      Emily is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      $endgroup$




      Which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?







      block-cipher






      share|improve this question









      New contributor



      Emily is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.










      share|improve this question









      New contributor



      Emily is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.








      share|improve this question




      share|improve this question








      edited 8 hours ago









      Ella Rose

      17.4k4 gold badges45 silver badges86 bronze badges




      17.4k4 gold badges45 silver badges86 bronze badges






      New contributor



      Emily is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.








      asked 9 hours ago









      EmilyEmily

      161 bronze badge




      161 bronze badge




      New contributor



      Emily is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.




      New contributor




      Emily is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.

























          1 Answer
          1






          active

          oldest

          votes


















          6














          $begingroup$


          In you opinion which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?




          I believe that it is essential that you keep the key secret.



          If there is any other aspect of the cipher that you must keep secret (that is, you become insecure if it is revealed), then your cipher is 'broken'.



          We can assume that the attacker can learn any long term aspect of your cipher implementation, such as the cipher name, mode of operation, key length. There are a number of possible ways he might learn it, such as an employee accidentally (or deliberately) leaking it, or if the attacker just obtains your implementation and dissects it. Hence, for security, we want to depend solely on something that we update routinely (such as the key). If the attacker learns the key, that limits the damage (as he can decrypt the traffic encrypted with that key, but nothing after we update the key. This idea is referred to as Kerckhoff's principle



          Now, you list the IV; that is typically updated constantly. On the other hand, we generally use it to refer to information that need not be secret. If it does have to be secret, then it really is part of the key, and should be considered that way.






          share|improve this answer











          $endgroup$

















            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "281"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: false,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/4.0/"u003ecc by-sa 4.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );







            Emily is a new contributor. Be nice, and check out our Code of Conduct.









            draft saved

            draft discarded
















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f74345%2fwhich-block-cipher-parameters-should-be-kept-secret%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            6














            $begingroup$


            In you opinion which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?




            I believe that it is essential that you keep the key secret.



            If there is any other aspect of the cipher that you must keep secret (that is, you become insecure if it is revealed), then your cipher is 'broken'.



            We can assume that the attacker can learn any long term aspect of your cipher implementation, such as the cipher name, mode of operation, key length. There are a number of possible ways he might learn it, such as an employee accidentally (or deliberately) leaking it, or if the attacker just obtains your implementation and dissects it. Hence, for security, we want to depend solely on something that we update routinely (such as the key). If the attacker learns the key, that limits the damage (as he can decrypt the traffic encrypted with that key, but nothing after we update the key. This idea is referred to as Kerckhoff's principle



            Now, you list the IV; that is typically updated constantly. On the other hand, we generally use it to refer to information that need not be secret. If it does have to be secret, then it really is part of the key, and should be considered that way.






            share|improve this answer











            $endgroup$



















              6














              $begingroup$


              In you opinion which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?




              I believe that it is essential that you keep the key secret.



              If there is any other aspect of the cipher that you must keep secret (that is, you become insecure if it is revealed), then your cipher is 'broken'.



              We can assume that the attacker can learn any long term aspect of your cipher implementation, such as the cipher name, mode of operation, key length. There are a number of possible ways he might learn it, such as an employee accidentally (or deliberately) leaking it, or if the attacker just obtains your implementation and dissects it. Hence, for security, we want to depend solely on something that we update routinely (such as the key). If the attacker learns the key, that limits the damage (as he can decrypt the traffic encrypted with that key, but nothing after we update the key. This idea is referred to as Kerckhoff's principle



              Now, you list the IV; that is typically updated constantly. On the other hand, we generally use it to refer to information that need not be secret. If it does have to be secret, then it really is part of the key, and should be considered that way.






              share|improve this answer











              $endgroup$

















                6














                6










                6







                $begingroup$


                In you opinion which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?




                I believe that it is essential that you keep the key secret.



                If there is any other aspect of the cipher that you must keep secret (that is, you become insecure if it is revealed), then your cipher is 'broken'.



                We can assume that the attacker can learn any long term aspect of your cipher implementation, such as the cipher name, mode of operation, key length. There are a number of possible ways he might learn it, such as an employee accidentally (or deliberately) leaking it, or if the attacker just obtains your implementation and dissects it. Hence, for security, we want to depend solely on something that we update routinely (such as the key). If the attacker learns the key, that limits the damage (as he can decrypt the traffic encrypted with that key, but nothing after we update the key. This idea is referred to as Kerckhoff's principle



                Now, you list the IV; that is typically updated constantly. On the other hand, we generally use it to refer to information that need not be secret. If it does have to be secret, then it really is part of the key, and should be considered that way.






                share|improve this answer











                $endgroup$




                In you opinion which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret?




                I believe that it is essential that you keep the key secret.



                If there is any other aspect of the cipher that you must keep secret (that is, you become insecure if it is revealed), then your cipher is 'broken'.



                We can assume that the attacker can learn any long term aspect of your cipher implementation, such as the cipher name, mode of operation, key length. There are a number of possible ways he might learn it, such as an employee accidentally (or deliberately) leaking it, or if the attacker just obtains your implementation and dissects it. Hence, for security, we want to depend solely on something that we update routinely (such as the key). If the attacker learns the key, that limits the damage (as he can decrypt the traffic encrypted with that key, but nothing after we update the key. This idea is referred to as Kerckhoff's principle



                Now, you list the IV; that is typically updated constantly. On the other hand, we generally use it to refer to information that need not be secret. If it does have to be secret, then it really is part of the key, and should be considered that way.







                share|improve this answer














                share|improve this answer



                share|improve this answer








                edited 5 hours ago









                kelalaka

                10.7k3 gold badges28 silver badges55 bronze badges




                10.7k3 gold badges28 silver badges55 bronze badges










                answered 8 hours ago









                ponchoponcho

                99.2k3 gold badges161 silver badges259 bronze badges




                99.2k3 gold badges161 silver badges259 bronze badges
























                    Emily is a new contributor. Be nice, and check out our Code of Conduct.









                    draft saved

                    draft discarded

















                    Emily is a new contributor. Be nice, and check out our Code of Conduct.












                    Emily is a new contributor. Be nice, and check out our Code of Conduct.











                    Emily is a new contributor. Be nice, and check out our Code of Conduct.














                    Thanks for contributing an answer to Cryptography Stack Exchange!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    Use MathJax to format equations. MathJax reference.


                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f74345%2fwhich-block-cipher-parameters-should-be-kept-secret%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    Invision Community Contents History See also References External links Navigation menuProprietaryinvisioncommunity.comIPS Community ForumsIPS Community Forumsthis blog entry"License Changes, IP.Board 3.4, and the Future""Interview -- Matt Mecham of Ibforums""CEO Invision Power Board, Matt Mecham Is a Liar, Thief!"IPB License Explanation 1.3, 1.3.1, 2.0, and 2.1ArchivedSecurity Fixes, Updates And Enhancements For IPB 1.3.1Archived"New Demo Accounts - Invision Power Services"the original"New Default Skin"the original"Invision Power Board 3.0.0 and Applications Released"the original"Archived copy"the original"Perpetual licenses being done away with""Release Notes - Invision Power Services""Introducing: IPS Community Suite 4!"Invision Community Release Notes

                    Canceling a color specificationRandomly assigning color to Graphics3D objects?Default color for Filling in Mathematica 9Coloring specific elements of sets with a prime modified order in an array plotHow to pick a color differing significantly from the colors already in a given color list?Detection of the text colorColor numbers based on their valueCan color schemes for use with ColorData include opacity specification?My dynamic color schemes

                    Ласкавець круглолистий Зміст Опис | Поширення | Галерея | Примітки | Посилання | Навігаційне меню58171138361-22960890446Bupleurum rotundifoliumEuro+Med PlantbasePlants of the World Online — Kew ScienceGermplasm Resources Information Network (GRIN)Ласкавецькн. VI : Літери Ком — Левиправивши або дописавши її