cryptography Questions

3

Solved

I'm looking for a way to use JSON Web Encryption (JWE) in a Node.js service. I have however only managed to find implementations of the related standard JWS. There are however several libraries for...
Nihility asked 25/3, 2015 at 14:50

4

Solved

I generated a base64-encoded key using this code in NodeJS v8.11.0: const secret = 'shezhuansauce'; const key = crypto.createHash('sha256').update(String(secret)).digest('base64'); //output is REt...
Pigskin asked 21/6, 2018 at 7:50

3

I'm working on BSCSCAN API. My goal is to get full balance for a given address as you can see on this page: https://bscscan.com/tokenholdings?a=0x1c82bdb6a93f50a564155ddbcb9cf1b1a244d169 I checked...
Haematin asked 13/6, 2021 at 8:5

3

Solved

I have read some texts about strong collision resistance and weak collision resistance, but I was unable to understand the difference. The only thing I can understand that there is a low probabilit...
Odrick asked 15/12, 2011 at 16:6

7

Solved

How good are algorithms used in Javascript Math.random() in different browsers? Is it okay to use it for generating salts and one-time passwords? How many bits from one random I can use?
Scarborough asked 13/4, 2011 at 15:31

2

Solved

I am using typescript version 3.7.2 to encrypt data using crypto-js. Algorithm - sha256 But my code is generating wrong hashed data. The code is working fine without using any key to hash data ...
Act asked 12/2, 2020 at 10:21

2

The private key is generated using Elliptic Curve. None of the methods from the SubtleCrypto interface of the Web Crypto API seem to be able to derive a public key from a private key, correct me if...
Crispin asked 7/5, 2022 at 9:14

4

Solved

In a nutshell, this is my problem: private string publicKeyString = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDVGUzbydMZS+fnkGTsUkDKEyFOGwghR234d5GjPnMIC0RFtXtw2tdcNM8I9Qk+h6fnPHiA7r27iHBfdxTP3oegQJW...
Lorylose asked 14/2, 2012 at 20:28

5

Solved

I have a high-level goal of creating a static utility class that encapsulates the encryption for my .NET application. Inside I'd like to minimize the object creations that aren't necessary. My que...

2

This line from cryptography.hazmat.backends import default_backend is creating this error Traceback (most recent call last): File "C:/Users/user/PycharmProjects/crypto/venv/cryptography.py", ...
Bergen asked 25/10, 2019 at 13:3

9

Solved

How can I decode a pem-encoded (base64) certificate with Python? For example this here from github.com: -----BEGIN CERTIFICATE----- MIIHKjCCBhKgAwIBAgIQDnd2il0H8OV5WcoqnVCCtTANBgkqhkiG9w0BAQUFADBp...
Selfridge asked 3/6, 2013 at 14:33

7

I use a javax.crypto.cipher for encrypt and decrypt some data. It's working well. But sometimes, the decryption faill with a badPaddingException. If i compare a succefull call with a failling call,...
Goby asked 4/2, 2011 at 8:0

6

Solved

I have tried for days to get bcrypt installed on my windows machine with no luck. One of the dependencies (Windows 7 SDK) does not want to be installed even though I have tried numerous suggestions...
Claycomb asked 6/11, 2013 at 20:55

19

Solved

I have looked online for what this exception means in relation to my program but can't seem to find a solution or the reason why it's happening to my specific program. I have been using the example...
Wool asked 20/12, 2011 at 23:2

33

When I try to install the Cryptography package for Python through either pip install cryptography or by downloading the package from their site and running python setup.py, I get the following erro...
Oldworld asked 27/2, 2014 at 15:50

9

Solved

The following question is more complex than it may first seem. Assume that I've got an arbitrary JSON object, one that may contain any amount of data including other nested JSON objects. What I w...
Torrent asked 12/1, 2011 at 15:25

3

Solved

Okay, so I have a text file named Kryptert that is encrypted. A key file named private with the private key. I want the output to be in a text file named Klartext. I am about to rip my hair out, b...
Felicio asked 17/2, 2017 at 14:48

4

Solved

Given some interval [a, b] of indices (64-bit unsigned integers), I would like to quickly obtain an array that contains all of these indices ordered according to a uniformly distributed hash functi...
Paramnesia asked 21/4, 2023 at 21:57

3

Solved

Yesterday I tried to install a ruby or update rvm on Ubuntu, today on mac os, and I failed in the same place on both: $ rvm get head Downloading https://get.rvm.io Downloading https://raw.githubus...
Botch asked 25/1, 2019 at 14:24

7

Solved

I'm designing an authentication system that works like the following: User enters password Salt is generated. Password is hashed with whirlpool Whirlpool hashed password concatenated with the pla...

3

I use this circuit as per official documentation: pragma circom 2.0.0; /*This circuit template checks that c is the multiplication of a and b.*/ template Multiplier2 () { // Declaration of si...
Salford asked 6/1, 2023 at 19:6

6

Solved

Today I thought: well, even if there is great suspicion on RDRAND implementation of NIST SP 800-90A, it is still a hardware implementation of pseudo-random number generator (PRNG) that must be good...
Exuberate asked 6/11, 2014 at 3:39

8

Solved

How can you create an md5 hash for a string on a mac using bash? md5sum does not exist in my environment. I did a man for md5 but I'm confused about what that really does. md5 "string" does not ...
Seppuku asked 25/1, 2012 at 1:28

0

in the excellent reply to this question: How to generate Bitcoin keys/addresses from a seed in Python? there is a discussion of 3 ways to generate a BIP32Key from mnemonics or extended private keys...
Florentinaflorentine asked 6/4, 2023 at 0:51

2

Solved

I am very new at python, I was working on a program that encrypts a text string, then saves it to a file. My program works perfectly when I encrypt then decrypt it in the same session. What I would...

© 2022 - 2024 — McMap. All rights reserved.