cryptography Questions

4

Solved

For demonstration-purposes, what are a couple examples of strings that collide when hashed? MD5 is a relatively standard hashing-option, so this will be sufficient.
Abiotic asked 3/8, 2009 at 19:15

6

Solved

I have a Android application which provides in-app billing and we have our application server to which android application connects to provide services to the user, on in-app purchase we want to pu...
Bifoliate asked 9/4, 2011 at 12:49

2

Solved

Program's Purpose: Rune Cipher Note - I am linking to my Own GitHub page below (it is only for purpose-purpose (no joke intended; it is only for the purpose of showing the purpose of it - what I ne...
Cleodell asked 27/2, 2021 at 16:37

3

Solved

I'm trying to write a simple Java program that will encrypt plain text with AES-256-CBC. There is class: import javax.crypto.Cipher; import javax.crypto.spec.IvParameterSpec; import javax.crypto.s...
Blanca asked 19/10, 2017 at 16:59

1

I am trying to encrypt a piece of string in nodejs and need to decrypt that in front end javascript. In nodejs I was using the crypto library and in front end using web crypto. Facing some error wh...
Bramante asked 28/3, 2019 at 5:27

7

Solved

For a payment provider, I need to calculate a hash-based message authentication code, using HMAC-SHA256. That is causing me quite a bit of trouble. The payment provider gives two examples of orrec...
Venereal asked 29/8, 2012 at 19:26

1

Solved

A penetration test has recommended that we change our JWT implementation to use asymmetric signing instead of symmetric signing, which is working well. The current (perfectly working) code to Creat...
Baccarat asked 22/2, 2021 at 20:53

4

I'm making a little utility to help me remember passwords by repetition. I'd like to enter password to be remembered only once every day and not before each session. Of course, I wouldn't store a p...
Ravin asked 6/11, 2011 at 18:0

1

I am trying to verify signature from the Sendgrid signed webhook. Current Sendgrid documentation only provides example in Golang to use ecdsa package. They say that this can be achieved with Node c...
Sternutation asked 30/6, 2020 at 17:19

3

Solved

A collegue and myself have been trying to understand how jwt tokens verify tokens, but from our reading we seem to be confusing ourselves. Please can someone help confirm whether my thinking is co...
Prier asked 7/3, 2017 at 9:41

4

Solved

I am trying to write a simple proof-of-work nonce-finder in python. def proof_of_work(b, nBytes): nonce = 0 # while the first nBytes of hash(b + nonce) are not 0 while sha256(b + uint2bytes(non...
Brewmaster asked 12/9, 2015 at 10:56

3

Solved

I'm in an infosec class and I stumbled upon this concept online and it intrigued me. I've also looked at a few websites and wikipedia that explain the concept, as well as a few posts on stackoverfl...
Virgenvirgie asked 10/12, 2013 at 21:45

1

Does .NET's RC2CryptoServiceProvider conform to OpenSSL. I'm using RC2CryptoServiceProvider with CBC but the encrypted value for the same text (using the same key and init vector) is different from...
Omidyar asked 29/1, 2014 at 2:9

7

Solved

I'm trying to understand what the Java java.security.Signature class does. If I compute an SHA1 message digest, and then encrypt that digest using RSA, I get a different result to asking the Signat...
Sudatory asked 6/2, 2009 at 16:51

4

Solved

I know the curve name (secp256k1) and the X and Y coordinates of the EC public key. How do I make a org.bouncycastle.jce.interfaces.ECPublicKey out of them? I've read https://stackoverflow.com/a/...
Reflux asked 19/10, 2015 at 15:44

5

Solved

I have an application which is making use of the RSACryptoServiceProvider to decrypt some data using a known private key (stored in a variable). When the IIS Application Pool is configured to use...
Glissando asked 9/7, 2009 at 9:48

4

Solved

I have a string and a key, which i want to generate an HMAC SHA256 from it. Although i'm using 2 libs IDZSwiftCommonCrypto and CryptoSwift and this answer Nothing really worked for me. My source...
Chamonix asked 12/10, 2018 at 17:59

4

I would like to know if there is a way to use PBEKeySpec with a byte array argument. Please find a link to the documentation below: http://docs.oracle.com/javase/1.7/docs/api/javax/crypto/spec/PB...
Adrieneadrienne asked 24/8, 2012 at 12:59

7

Solved

I've referred the file System.Security.dll as described in this article but according to my IDE, the line using System.Security.Cryptography; can be safely removed as it's not being used. The same...
Varied asked 21/9, 2012 at 7:40

1

I trying to generate Ethereum addresses for the HD Wallet keys implemented with bitcoinj library, but I got confused: DeterministicSeed seed = new DeterministicSeed("some seed code here",...
Hiltner asked 29/12, 2020 at 11:23

2

I am writing a python script that involves sending a public key over a network. I am using <https://cryptography.io/en/latest/hazmat/primitives/asymmetric/serialization/.> public_key = self.n...

3

Solved

I have a valid certificate issued by the spanish authority (FNMT) and I want to play with it to learn more about it. The file has extension .p12 I would like to read the information in it (first a...

1

Solved

I am looking for a PRNG that works in O(1) time and never encounters a duplicate number as you increment through the values. The question Unique (non-repeating) random numbers in O(1)? doesn't get ...
Loraleeloralie asked 11/1, 2021 at 5:40

1

I would like to get the expirydate from the cert_name.pfx like in: Get .pfx Cert File Expiration with pyOpenSSL from OpenSSL import crypto from cryptography import x509 from cryptography.hazmat.bac...
Zworykin asked 7/1, 2021 at 15:49

5

Solved

In the browser, I read in a file using the JS FileReader().readAsBinaryString(). Using the CryptoJS library I can MD5 hash the data. This works fine but I do not know how to handle large files. E...
Blakley asked 22/5, 2015 at 17:19

© 2022 - 2024 — McMap. All rights reserved.