cryptography Questions

4

Solved

There are test vectors for PBKDF2-HMAC-SHA1 in RFC6070. There are test vectors for HMAC-SHA2 in RFC4231. But so far I haven't found test vectors for PBKDF2-HMAC-SHA2 anywhere. I'm most interested i...
Ecru asked 26/2, 2011 at 23:48

1

Solved

I am new to encryption and hashing in python. I need this for authentication in one of my flask project. So my friend told me to use crypto package but when i searched it up i got crypto and pycryp...
Kimura asked 21/12, 2020 at 16:59

2

I need a good encrypt algorithm for a PIC microcontroller. After some googling, it seems XXTEA is the only option, however, "XXTEA is vulnerable to a chosen-plaintext attack requiring 2^59 queries ...
Immunogenetics asked 15/3, 2013 at 18:48

5

Solved

How can I generate random numbers in a specific range using crypto.randomBytes? I want to be able to generate a random number like this: console.log(random(55, 956)); // where 55 is minimum and 9...
Stereochrome asked 9/11, 2015 at 12:44

2

I need to support Diffie Hellman encryption, now in order to test this i need to create a certificate with DH key parameters eg. key-length - 2048 etc. Now as i understand DH doesn't work with se...
Stickinthemud asked 3/10, 2019 at 13:42

1

Solved

It appears that .NET Core supports creation of custom curves in ECC. I've tried to define the Curve25519, as shown below: public class Curves { // TODO: check the key gen rand. public static E...
Listel asked 30/4, 2017 at 21:31

7

i have a .PEM file that includes public key and a private key for SSL data transfer like this: -----BEGIN RSA PRIVATE KEY----- private key data -----END RSA PRIVATE KEY----- -----BEGIN CERTIFICAT...
Sandusky asked 13/9, 2011 at 10:39

3

What is the difference between encryption and a digest?
Banyan asked 26/7, 2010 at 6:30

2

The following lines show how to generate a key in Tink: keysetHandle=KeysetHandle.generateNew(AeadKeyTemplates.AES128_GCM) privateKeysetHandle = KeysetHandle.generateNew(SignatureKeyTemplates.ECD...
Travis asked 17/5, 2019 at 18:57

1

I am passing a byte[] to my method and I am trying to generate a pubKey. Looking at the error look's like i first need to decompress before generating pubKey. How can I decode a compressed coordina...
Manful asked 16/11, 2020 at 17:30

2

I'm trying to use the WinCrypt API in C++. My application need to cipher, decipher, sign and verify files, and I know how to do that once I have the correct keys. But my problem is actually that t...
Couching asked 7/12, 2011 at 9:15

3

Solved

Are there any difference between RSA encryption/decryption exponent and RSA sign/check exponent?
Rosenberry asked 23/5, 2011 at 14:13

2

Solved

Writing code to generate Digital Certificate using BouncyCastle. Here is the essential part of code causing problem. public X509Certificate generateCertWithKeypair(KeyPair caPair) throws Invalid...
Rhizogenic asked 11/10, 2013 at 12:49

0

I have a Java Application that uses "AES-128 bits/ECB/PKCS5Padding" (java8 linux/window), the code is quite simple KeyGenerator keygen = KeyGenerator.getInstance("AES"); Secur...
Encaustic asked 11/11, 2020 at 12:43

2

Solved

I have read this two posts: One and Two, but I still have question. I use KeyStore (Android 9) to generate an AES key, and use isInsideSecureHardware() method to check whether the key isInsideSecu...
Quintilla asked 15/4, 2020 at 9:48

10

Solved

My application will take a set of files and sign them. (I'm not trying to sign an assembly.) There is a .p12 file that I get the private key from. This is the code I was trying to use, but I get a ...
Fauna asked 16/9, 2011 at 12:22

11

Solved

License keys are the defacto-standard as an anti-piracy measure. To be honest, this strikes me as (in)Security Through Obscurity, although I really have no idea how license keys are generated. What...
Trocki asked 8/6, 2010 at 23:24

16

Solved

I have a simple android client which needs to 'talk' to a simple C# HTTP listener. I want to provide a basic level of authentication by passing username/password in POST requests. MD5 hashing is t...
Kurrajong asked 31/1, 2011 at 0:3

2

I Have dockerized airflow service with a FERNET_KEY as an environment variable exported using a .env file(which also includes other environment variables apart from FERNET_KEY). When I build and r...
Renteria asked 31/10, 2019 at 13:57

1

Solved

Im trying to RSA-PSS-sign a JAR file with the JarSigner using PKCS#11. To specify the signature algorithm the JarSigner uses the sigalg flag. The JDK 14 Docs of the JarSigner does not specify which...
Gowk asked 2/10, 2020 at 13:11

4

Solved

Generate MD5 hash of a string using standard library in Kotlin? I have tried below mention code import java.math.BigInteger import java.security.MessageDigest fun md5(input:String): String {...
Latent asked 2/10, 2020 at 12:34

2

Solved

I'm trying to read an encrypted PKCS8 private key file. I generated the keys like this: openssl genrsa -out file.pem -passout pass:file -aes256 1024 openssl pkcs8 -topk8 -inform pem -in file.pem -...
Pentimento asked 7/10, 2015 at 0:22

3

Solved

I'm using the following example for signing + verifying in Node.js: https://github.com/nodejs/node-v0.x-archive/issues/6904. The verification succeeds in Node.js but fails in WebCrypto. Similarly, ...
Orthoclase asked 18/9, 2016 at 4:39

1

Solved

My task is to reproduce the plot below: It comes from this journal (pg 137-145) In this article, the authors describe a kleptographic attack called SETUP against Diffie-Hellman keys exchange. In p...

4

Solved

I'm a bit confused on encryption file formats. Let's say I want to encrypt a file with AES-256. I run the file through the encryption algorithm and I now have a stream of encrypted bytes. I obvio...
Hidie asked 20/8, 2009 at 15:13

© 2022 - 2024 — McMap. All rights reserved.