cryptography Questions

1

Solved

OpenSSL: 3.0.8 Python: 3.9.16 I enabled FIPS using below script but FIPS functionality is not working when I use custom libcrypto path but working fine if I use default path. custom path:/tmp/fips_...
Muckraker asked 2/4, 2023 at 15:54

1

Python: 3.9.16 OpenSSL: 3.0.8 fips_ccode.c #include <stdio.h> #include <stdlib.h> #include <openssl/provider.h> #include "openssl/md5.h" int main(void) { OSSL_PROVID...
Howells asked 30/3, 2023 at 14:26

1

G(Gx, Gy) -- which is also called generator -- is a point on Elliptic Curve (EC) on Finite field. Finite field size = p -- prime modulus. Say we have an EC(Fp): y**2 = x**3 + ax + b (mod p) How sh...
Abridge asked 30/4, 2012 at 13:37

3

Solved

I'm trying to figure out which "safe" ECC curves are supported in Bouncy Castle. I found a few curves in the namespace Org.BouncyCastle.Asn1, but they are hard to find, and I'm sure I'm missing som...
Mercier asked 17/3, 2014 at 14:57

1

Solved

I'm implementing some protocol using some 3rd party repository (Private Join and Compute), and the repo only supports built-in curves in FIPS modules (P-224, 256, 348 and 512) in openssl when creat...
Seascape asked 27/3, 2023 at 8:50

2

Golang's elliptical curve library can derive a secret key given a public coordinate with a X and Y value (uncompressed coordinates). However, when the point given is a single value in X9.62 compre...
Entomophagous asked 18/9, 2017 at 16:4

7

Solved

I am trying to implement password based encryption algorithm, but I get this exception: javax.crypto.BadPaddingException: Given final block not properly padded What might be the problem? Here...
Verisimilar asked 8/11, 2011 at 11:45

6

Solved

When I put the first key/value pair to Vault: vault write secret/item/33 item_name='item_name' It works well and I get: vault read secret/item/33 Key Value --- ----- refresh_interval 768h0m0s...
Maquette asked 22/3, 2017 at 14:26

1

I'm seeing some issues with random number generation inside containers running in a kubernetes cluster (repeated values). It might be the lack of entropy inside the container, or it could be someth...
Pteridology asked 10/5, 2019 at 12:41

4

Solved

UPDATED 2019: Bouncycastle now support PBKDF2-HMAC-SHA256 since bouncycastle 1.60 Is there any reliable implementation of PBKDF2-HMAC-SHA256 for JAVA? I used to encrypt using bouncycastle but i...
Technical asked 22/3, 2014 at 17:13

11

Solved

I'm trying to implement AES encryption in swift. The encryption decryption for Android and C# is working properly. I need to implement it in swift. It's current code for android and C# is followed ...
Rockwood asked 7/6, 2016 at 13:9

2

Solved

I want to create a salt-hash using node.js crypto lib without having to parse any hardcoded data. What do I mean with hardcoded? var salt, hardcodedString = "8397dhdjhjh"; crypto.createHmac('sha5...
Hellenism asked 17/7, 2012 at 9:58

2

Solved

What are the differences between .pem, .cer and .der? As far as I know, .cer contains public key. Are there any open frameworks that I can use to encrypt my data using this public key?
Cupola asked 30/3, 2014 at 11:27

3

hashcat64.exe hashcat -m0 -a0 crackme.txt password.txt Device #1: Intel's OpenCL runtime(GPU only) is currently broken. We are waiting for updated OpenCL drivers from Intel Hash 'hashcat': Token ...

14

Solved

I see a lot of confusion between hashes and encryption algorithms and I would like to hear some more expert advice about: When to use hashes vs encryptions What makes a hash or encryption algorit...
Slovak asked 9/2, 2011 at 17:30

1

I have an RSA512 JWKS released by Identity Server 4 which is used by clients to validate the token signature. The problem is that I also wanted to validate it on the https://jwt.io/ site but I don'...
Gaivn asked 20/9, 2021 at 14:55

1

What is the recommended RSA key format to use if you only started using it nowadays? I know that PKCS#1 is a format dedicated to RSA keys but do I need to avoid using it because it's old? recomme...
Syllable asked 5/2, 2023 at 9:42

4

Solved

Using the following node js: var crypto = require('crypto'); var encrypt = function (input, password, callback) { var m = crypto.createHash('md5'); m.update(password); var key = m.digest('hex')...
Hammer asked 23/6, 2016 at 16:42

5

Solved

So, I have written some code to take a PEM, add it to a PKCS keystore via bouncycastle, and then use java crypto to import the PKCS keystore value into a JKS keystore. I swear that yesterday I had...
Kamkama asked 30/9, 2016 at 18:22

8

I'm trying to implement password reset on an OWIN/Katana based ASP.NET MVC website running in Azure. It works fine when run locally but fails in production. I create a UserToken Provider userMan...
Acrogen asked 21/5, 2014 at 3:51

3

Solved

I have a problem decrypting text, which is encrypted in Go lang, with CryptoJS. Here is Go code: https://play.golang.org/p/xCbl48T_iN package main import ( "crypto/aes" "crypto/cipher" "encod...
Talented asked 28/4, 2016 at 8:52

6

Solved

I have an instance of System.Security.Cryptography.RSACryptoServiceProvider, i need to export it's key to a PEM string - like this: -----BEGIN RSA PRIVATE KEY----- MIICXAIBAAKBgQDUNPB6Lvx+tlP5QhSi...
Comply asked 19/5, 2014 at 9:57

5

Solved

I have a use case in my application that should prevent the user from choosing one of their last 3 passwords while resetting their password. I'm using Angular for the front end and Spring Boot for ...
Haskins asked 8/2, 2019 at 17:28

18

Solved

How can I hash some String with SHA-256 in Java?

4

Solved

Scenario I've got the following code: <script src="http://crypto-js.googlecode.com/svn/tags/3.1.2/build/rollups/aes.js"></script> <div id="decrypted">Please wait...</div...
Monocyte asked 8/9, 2015 at 18:54

© 2022 - 2024 — McMap. All rights reserved.