cryptography Questions
5
Solved
Look at the following line of java:
Mac.getInstance("HmacSHA1");
If I put this in a simple test program, it runs without problems on my server. However, if I use this line in a container, I get
...
Trachyte asked 18/5, 2010 at 10:11
1
I am trying to create a set of public/private keys from a mnemonic based on BIP0039. I am working in Python.
Here is the code I have so far:
from mnemonic import Mnemonic
mnemon = Mnemonic('engli...
Broadwater asked 15/1, 2019 at 16:6
0
As of Go 1.16, x509.Encrypt/DecryptPEMBlock is Deprecated. What is the alternative for this to encrypt private key?
Ceramics asked 1/6, 2021 at 10:33
1
I have a process that is creating a symmetrically encrypted file with gpg:
gpg --batch --passphrase=mypassphrase -c configure.txt
I can decrypt the encrypted file using gpg just fine with any us...
Chemosynthesis asked 19/3, 2019 at 16:57
5
Solved
I've seen key IDs used in several places and would like to use them in my program, but I haven't been able to find a description of them. How are they generated?
Bader asked 25/4, 2011 at 5:3
7
Solved
I've always used a proper per-entry salt string when hashing passwords for database storage. For my needs, storing the salt in the DB next to the hashed password has always worked fine.
However, ...
Cristincristina asked 2/8, 2009 at 21:27
4
Solved
I need to generate a Key from a string, such that I can always create the same key from the same string. (Specifically a Key object, so that I can use it to create a Cipher in turn to create a Seal...
Nagel asked 2/3, 2012 at 16:30
5
I am using spring config server and spring security. I have followed the link
https://cloud.spring.io/spring-cloud-config/multi/multi__spring_cloud_config_server.html
I have added JCF in C:\Progra...
Puritanism asked 1/11, 2018 at 7:4
1
Solved
I am taking a class in computer security, one of our assignments is to brute force DES that has a weak key.
My Code:
public static void main(String[] args) throws Exception {
String temp;
String...
Sheetfed asked 1/5, 2021 at 18:50
3
Solved
I have following ECC private and public key pairs:
Private key : 0x63bd3b01c5ce749d87f5f7481232a93540acdb0f7b5c014ecd9cd32b041d6f33
Public Key : 0x04017655e42a892cc71bccedcb1cd421d03530e1d7edb52c...
Northway asked 30/12, 2019 at 2:36
3
Solved
Cheers. This is a copy of my question on crypto stack exchange.
I'm dealing with HSM via PKCS#11 C/Python interface. I'm wondering is it possible to do some C_Encrypt/C_Decrypt in hardware. By say...
Trailblazer asked 14/11, 2018 at 10:24
1
Solved
I am looking for a good way to generate secure random numbers in Node.js. One answer that I have found and am using is crypto.randomInt(). Is this method cryptographically secure? Are there better ...
Menam asked 13/4, 2021 at 10:57
4
Solved
Today I was doing some leisurely reading and stumbled upon Section 5.8 (on page 45) of Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) (NIST S...
Decompound asked 26/4, 2011 at 21:57
5
I am currently using SHA256 with a salt to hash my passwords. Is it better to continue using SHA256 or should I change to SHA512?
Buddy asked 24/7, 2012 at 4:53
7
Solved
Is calculating an MD5 hash less CPU intensive than SHA-1 or SHA-2 on "standard" laptop x86 hardware? I'm interested in general information, not specific to a certain chip.
UPDATE:
In my case, I'm ...
Galligaskins asked 27/4, 2010 at 16:19
2
Solved
I want to print the output from a hashing function to stdout. I use the groestl hash function but i suppose it works the same as sha or others. Doing it like this prints the hash as it should...
Neglect asked 1/4, 2021 at 13:6
3
Solved
I am using a the hash() function to get the hash value of my object which contains two integers and two Strings. Moreover, I have a dictionary where I store these objects; the process is that I che...
Eighteenmo asked 27/2, 2017 at 17:13
3
Solved
If I have a 32 character string (an MD5 hash) and I encode it using Base64, what's the maximun length of the encoded string?
Arundinaceous asked 25/11, 2010 at 14:35
6
Solved
I'm a programmer and relatively new to cryptography, so pardon my rookie question. :)
Let's say we have a message, both in plain text and encrypted with a 128-bit key.
In theory, it possible to so...
Barbey asked 7/12, 2010 at 12:51
2
I'm trying for some time to decrypt a message in AES that use a Java app , but it never works . Can someone help me?
var options = { mode: CryptoJS.mode.ECB, padding: CryptoJS.pad.Pkcs7 };
/***...
Amerson asked 3/9, 2016 at 21:30
3
Solved
I've encrypted a password field in my DB by MD5, and I handle it encrypted in my back-end, but when user types their password in, it is in plain text.
Is there a safe way to pass the password from...
Tolerate asked 8/6, 2016 at 11:23
2
Solved
I'm using JWKS format to provide from an authentication service the public key that can be used to validate tokens coming from that authentication service. However, to perform validation I need to ...
Waldos asked 21/3, 2021 at 22:2
1
Solved
Introduction
As a part of SHA-256 hashing algorithm, there's a function that is often being referred as σ1, or sigma0 for convenience. Basically, it takes X as input, where X is 32-bit unsigned val...
Braunstein asked 12/3, 2021 at 21:52
1
Python has functionality to create hex UUID's like so:
>>> import uuid
>>> uuid.uuid4().hex
'47be94c37e484e13ab04ed3c54a5b681'
Is it possible to do the same in client javascri...
Armillary asked 5/4, 2018 at 3:33
2
Solved
Suppose I have the following JWK as the deserialised body of some JWS (RFC7515), where the modulus n is partially omitted for display purposes
{
"kty": "RSA",
"e": &...
Nestle asked 26/2, 2021 at 16:3
© 2022 - 2024 — McMap. All rights reserved.