cryptography Questions

4

I am trying to calculate the MAC using Cryptographic checksums are calculated using ISOIEC 9797-1 MAC algorithm 3 with block cipher DES, zero IV (8 bytes), and 1S09797-1 padding method 2. The MAC ...
Causation asked 1/12, 2013 at 13:31

1

Solved

I am working on a project where I generate an EC private key using Java and then import it in the browser using JavaScript. The key imports successfully in Chrome, but it fails in Safari.Here’s my ...

3

Solved

I'm developing an application that communicates with a DB located on a VPS. I need to store an information, encrypted with AES-256, in my DB. If I'm correct, when I encrypt, there's an IV paramet...
Caning asked 6/5, 2016 at 16:58

4

Solved

Suppose I have a server storing encrypted text (end-to-end: server never sees plain text). I want to be able to do full text search on that text. I know this is tricky, but my idea is to use the t...
Gambell asked 9/3, 2014 at 18:55

5

Solved

This is really embarassing on virtually any site on the internet, window.crypto.subtle returns SubtleCrypto {} __proto__: SubtleCrypto in the chrome console (v61 (Official Build) (64-bit))...
Hagiolatry asked 28/9, 2017 at 11:33

4

Solved

I need to read in an RSA private key from a file to sign a JWT. I have found some examples on how to save a generated RSA key to disk but nothing showing how to build a key struct based on a pre-ge...
Manifesto asked 28/5, 2017 at 18:28

3

Solved

I need to send confidential data to a server over a TCP connection. I have done a lot of researching and I understand the theoretical part. Based on what I have researched I want to do the followin...
Desired asked 24/9, 2011 at 15:33

2

I am using Crypto library of Node.js for encryption/decryption as follows : encrypt = function(text, passPhrase){ var cipher = crypto.createCipher('AES-128-CBC-HMAC-SHA1', passPhrase); var cryp...
Cerebral asked 15/9, 2014 at 13:37

9

Solved

Here is my code. X509Certificate pXCert = new X509Certificate2(@"keyStore.p12", "password"); RSACryptoServiceProvider csp = (RSACryptoServiceProvider)pXCert.PrivateKey; string id = CryptoConfig.M...
Cioban asked 15/9, 2011 at 15:4

5

Solved

I have to generate a uniform, secure random integer within a given range for a program that generates passwords. Right now I use this: RNGCryptoServiceProvider rng = new RNGCryptoServiceProvider();...
Hydrokinetics asked 23/2, 2017 at 21:22

4

I need signatures made in golang verifiable in nodejs and conversely (with ethereum wallets/private keys). But the two libraries that I use provide different results for the signing of a message. I...
Ressieressler asked 8/5, 2020 at 15:8

2

I have a key (say) "thisist0psecret" that I want to use as a symmetric encryption/decryption key with the Google Tink library. I am baffled that I am unable to do this simple thing. I can...
Johore asked 4/9, 2018 at 17:14

1

Okay so I am trying to create an aws v4 signature using this template from Amazon in javascript, with node.js. I am using the template's credentials , region, date, and service in order to test my ...

2

I wrote a little webapp for secure message transfer to learn more about encryption, and wanted to show it to my friends and let them play with it a little, so I hosted it on my little server, and w...
Jasik asked 29/12, 2019 at 13:50

3

I'm looking for a hash-function which will produce the same result for unordered sequences containing same elements. For example: Array_1: [a, b, c] Array_2: [b, a, c] Array_3: [c, b, a] The ha...
Electrocorticogram asked 12/12, 2012 at 20:19

11

Solved

I understand that normally an SSL (or more precisely X.509) certificate is supposed to be signed by some certifying authority to assure that it is genuine. In some cases no such signature exists, ...
Raised asked 16/5, 2009 at 0:48

4

Solved

There are well-known algorithms for cryptography to compute modular exponentiation (a^b)%c (like Right-to-left binary method here : http://en.wikipedia.org/wiki/Modular_exponentiation). But do al...
Ledoux asked 22/3, 2012 at 7:35

2

Solved

I'm sorry to ask your skills about a question asked so many times. I have an issue about RSA crypthography. I've already checked the other topics about this issue but i didn't find any helpful answ...
R asked 29/12, 2012 at 19:50

4

Solved

I'm using crypto/rsa, and trying to find a way to properly save and load a key. Is there a correct way to create a []byte from an rsa.PrivateKey. If so, is there a way to properly do so for an rsa....
Hypoplasia asked 25/11, 2012 at 20:20

2

Solved

Intel supports RDRAND (also known as Intel secure key) instruction for returning random numbers. And it's available in Ivy Bridge processors. I wonder, is there any ARM processor featuring instruct...
Macrophysics asked 8/9, 2016 at 11:45

5

Solved

I know, it looks strange, but I need to sign some data on client-side using javascript only, no ajax backdoor to server-side openssl available. Could someone suggest some client-side solution to si...

2

Solved

Apple's documentation for OS X talks about using SecItemImport to obtain a SecKeyRef. The function signature looks like this: OSStatus SecItemImport ( CFDataRef importedData, CFStringRef fileNam...
Mini asked 12/5, 2014 at 15:49

12

How do I make an MD5 hash of a string with Delphi?
Figurehead asked 12/9, 2008 at 10:26

4

Does iOS expose API for key generation, and secret key derivation using ECDH? From what I see, apple are using it (and specifically x25519) internally but I don't see it exposed as public API by ...
Hauger asked 19/9, 2017 at 13:1

8

Solved

I am currently using the following for hashing passwords: var pass_shasum = crypto.createHash('sha256').update(req.body.password).digest('hex'); Could you please suggest improvements to make the...
Monde asked 23/12, 2012 at 23:56

© 2022 - 2024 — McMap. All rights reserved.