Can’t understand specific cryptographic based symmetric algorithm, how to solve? [on hold]

I am working on a cryptographic based symmetric algorithm. But before that’s, I have to make software code in java for a previous proposed algorithm. The algorithm that’s i have to solve looks like:

A. Encryption Process
Continue reading Can’t understand specific cryptographic based symmetric algorithm, how to solve? [on hold]

Can’t understand specific cryptographic based symmetric algorithm, how to solve? [on hold]

I am working on a cryptographic based symmetric algorithm. But before that’s, I have to make software code in java for a previous proposed algorithm. The algorithm that’s i have to solve looks like:

A. Encryption Process
Continue reading Can’t understand specific cryptographic based symmetric algorithm, how to solve? [on hold]

Can Asymmetric encryption be used instead of modern authentication strategy?

Assuming that I have a way to associate a combination of public private key encryption with real people/user. The private key is stored on the device of the user.

User have to communicate with some web service on multiple ho… Continue reading Can Asymmetric encryption be used instead of modern authentication strategy?

With GPG, can 3rd party verify that message has been encrypted by specific public key?

Bob is sending message X to Alice. He encrypts X with Alice’s public key using gpg and sends her encrypted message (ciphertext).

Later Alice claims that Bob made a mistake and the ciphertext was not created with her public key.

Can Bob p… Continue reading With GPG, can 3rd party verify that message has been encrypted by specific public key?