Benefit of asymmetric encryption vs trivial alternatives in compromised software?

Background information:
I have a client application that communicates with a server through a web API.
The data being communicated is not personally sensitive (no passwords, credit card details, usernames, etc). It’s just challenge/respons… Continue reading Benefit of asymmetric encryption vs trivial alternatives in compromised software?

From fragmented encryption chaos to uniform data protection

Encryption is so critical to enterprise security that it’s almost like air: It’s a necessity, it’s everywhere, and we can’t live without it. On the surface, having encryption everywhere seems like a great idea. However, in many ways the drive to achiev… Continue reading From fragmented encryption chaos to uniform data protection

How to convert plaintext to element of cyclic group in Cramer-Shoup cryptosystem [migrated]

I am trying to implement a cramer-shoup cryptosystem but I don’t understand how to work with the plaintext I want to encrypt.
From what I understand, the plaintext needs to be converted to an element of the cyclic group G, which was genera… Continue reading How to convert plaintext to element of cyclic group in Cramer-Shoup cryptosystem [migrated]