About 50 results
Open links in new tab
  1. What are the requirements of a nonce? - Cryptography Stack Exchange

    However, in certain settings stronger requirements are put on the nonces; like for instance in the CBC-mode of operation for block ciphers the IV (nonce) needs to be unpredictable (a requirement, when …

  2. CVE-2024-31497, nonces and random numbers: Can someone explain, …

    Apr 17, 2024 · The nonces that I know of must be unique (non-repeating), but they may be predicable. Not exactly. The definition of a nonce is that it must be non-repeating. Some schemes that use a …

  3. Incrementing nonces vs regular nonces? - Cryptography Stack Exchange

    Oct 14, 2021 · So I guess one alternative to having this incrementing-counter approach, would be just using regular, random nonces for every message that you could send with the message. But what …

  4. What is the main difference between a key, an IV and a nonce?

    Nonces should generally be randomly generated but instead iterated using a counter as wide as the nonce. This guarantees the nonce will not be reused (for the full $2^n$ period of the counter).

  5. What advantage is there for using a nonce and a timestamp?

    I know both nonces and timestamps are used to prevent replay attacks, and nonces may offer increased security in the situation a message could be replayed with the timestamp in the allowable window.

  6. NaCL - should I keep track of expired nonces

    May 3, 2023 · After encrypting the updated plaintext I store the ciphertext and the new nonce back to the database. My question is: Should I keep track of the expired nonces so that no other plaintext is ever …

  7. Use of nonces in Kerberos and Needham–Schroeder protocols

    Use of nonces in Kerberos and Needham–Schroeder protocols Ask Question Asked 13 years, 9 months ago Modified 13 years, 9 months ago

  8. Encrypting with nonces in IKE - Cryptography Stack Exchange

    Feb 27, 2022 · In IKE exchanges, first messages sent unencrypted and unauthenticated. For authentication, messages sent encrypted with nonces. If a man in the middle is eavesdropping this …

  9. authentication - How to use nonces to prevent replay attacks while ...

    Jun 18, 2022 · Nonces are often used to prevent replay attacks in networks. Because they are a one time use, any attacker replaying a request would be stopped because the nonce would be invalid. …

  10. Why is there no AES-512 for CTR & variants to have good large nonces?

    Dec 21, 2024 · AES-CTR and authenticated variants tend to have a 'problem' with lacking bit real-estate for nonce & counter. Why hasn't an AES-512 variant been standardized at some point? It would …