cryptography Questions
4
Solved
There are test vectors for PBKDF2-HMAC-SHA1 in RFC6070. There are test vectors for HMAC-SHA2 in RFC4231.
But so far I haven't found test vectors for PBKDF2-HMAC-SHA2 anywhere.
I'm most interested i...
Ecru asked 26/2, 2011 at 23:48
1
Solved
I am new to encryption and hashing in python. I need this for authentication in one of my flask project. So my friend told me to use crypto package but when i searched it up i got crypto and pycryp...
Kimura asked 21/12, 2020 at 16:59
2
I need a good encrypt algorithm for a PIC microcontroller. After some googling, it seems XXTEA is the only option, however, "XXTEA is vulnerable to a chosen-plaintext attack requiring 2^59 queries ...
Immunogenetics asked 15/3, 2013 at 18:48
5
Solved
How can I generate random numbers in a specific range using crypto.randomBytes?
I want to be able to generate a random number like this:
console.log(random(55, 956)); // where 55 is minimum and 9...
Stereochrome asked 9/11, 2015 at 12:44
2
I need to support Diffie Hellman encryption, now in order to test this i need to create a certificate with DH key parameters eg. key-length - 2048 etc.
Now as i understand DH doesn't work with se...
Stickinthemud asked 3/10, 2019 at 13:42
1
Solved
It appears that .NET Core supports creation of custom curves in ECC.
I've tried to define the Curve25519, as shown below:
public class Curves
{
// TODO: check the key gen rand.
public static E...
Listel asked 30/4, 2017 at 21:31
7
i have a .PEM file that includes public key and a private key for SSL data transfer like this:
-----BEGIN RSA PRIVATE KEY-----
private key data
-----END RSA PRIVATE KEY-----
-----BEGIN CERTIFICAT...
Sandusky asked 13/9, 2011 at 10:39
3
What is the difference between encryption and a digest?
Banyan asked 26/7, 2010 at 6:30
2
The following lines show how to generate a key in Tink:
keysetHandle=KeysetHandle.generateNew(AeadKeyTemplates.AES128_GCM)
privateKeysetHandle = KeysetHandle.generateNew(SignatureKeyTemplates.ECD...
Travis asked 17/5, 2019 at 18:57
1
I am passing a byte[] to my method and I am trying to generate a pubKey. Looking at the error look's like i first need to decompress before generating pubKey.
How can I decode a compressed coordina...
Manful asked 16/11, 2020 at 17:30
2
I'm trying to use the WinCrypt API in C++.
My application need to cipher, decipher, sign and verify files, and I know how to do that once I have the correct keys. But my problem is actually that t...
Couching asked 7/12, 2011 at 9:15
3
Solved
Are there any difference between RSA encryption/decryption exponent and RSA sign/check exponent?
Rosenberry asked 23/5, 2011 at 14:13
2
Solved
Writing code to generate Digital Certificate using BouncyCastle.
Here is the essential part of code causing problem.
public X509Certificate generateCertWithKeypair(KeyPair caPair)
throws Invalid...
Rhizogenic asked 11/10, 2013 at 12:49
0
I have a Java Application that uses "AES-128 bits/ECB/PKCS5Padding" (java8 linux/window), the code is quite simple
KeyGenerator keygen = KeyGenerator.getInstance("AES");
Secur...
Encaustic asked 11/11, 2020 at 12:43
2
Solved
I have read this two posts: One and Two, but I still have question.
I use KeyStore (Android 9) to generate an AES key, and use isInsideSecureHardware() method to check whether the key isInsideSecu...
Quintilla asked 15/4, 2020 at 9:48
10
Solved
My application will take a set of files and sign them. (I'm not trying to sign an assembly.) There is a .p12 file that I get the private key from.
This is the code I was trying to use, but I get a ...
Fauna asked 16/9, 2011 at 12:22
11
Solved
License keys are the defacto-standard as an anti-piracy measure. To be honest, this strikes me as (in)Security Through Obscurity, although I really have no idea how license keys are generated. What...
Trocki asked 8/6, 2010 at 23:24
16
Solved
I have a simple android client which needs to 'talk' to a simple C# HTTP listener. I want to provide a basic level of authentication by passing username/password in POST requests.
MD5 hashing is t...
Kurrajong asked 31/1, 2011 at 0:3
2
I Have dockerized airflow service with a FERNET_KEY as an environment variable exported using a .env file(which also includes other environment variables apart from FERNET_KEY).
When I build and r...
Renteria asked 31/10, 2019 at 13:57
1
Solved
Im trying to RSA-PSS-sign a JAR file with the JarSigner using PKCS#11. To specify the signature algorithm the JarSigner uses the sigalg flag. The JDK 14 Docs of the JarSigner does not specify which...
Gowk asked 2/10, 2020 at 13:11
4
Solved
Generate MD5 hash of a string using standard library in Kotlin?
I have tried below mention code
import java.math.BigInteger
import java.security.MessageDigest
fun md5(input:String): String {...
Latent asked 2/10, 2020 at 12:34
2
Solved
I'm trying to read an encrypted PKCS8 private key file. I generated the keys like this:
openssl genrsa -out file.pem -passout pass:file -aes256 1024
openssl pkcs8 -topk8 -inform pem -in file.pem -...
Pentimento asked 7/10, 2015 at 0:22
3
Solved
I'm using the following example for signing + verifying in Node.js: https://github.com/nodejs/node-v0.x-archive/issues/6904. The verification succeeds in Node.js but fails in WebCrypto. Similarly, ...
Orthoclase asked 18/9, 2016 at 4:39
1
Solved
My task is to reproduce the plot below:
It comes from this journal (pg 137-145)
In this article, the authors describe a kleptographic attack called SETUP against Diffie-Hellman keys exchange. In p...
Jemison asked 14/9, 2020 at 13:9
4
Solved
I'm a bit confused on encryption file formats.
Let's say I want to encrypt a file with AES-256. I run the file through the encryption algorithm and I now have a stream of encrypted bytes.
I obvio...
Hidie asked 20/8, 2009 at 15:13
© 2022 - 2024 — McMap. All rights reserved.