cryptography Questions

2

Solved

I'm developing a set of cryptographic algorithms / protocols for educational purposes. Specifically, I am currently working on OAEP encoding. OAEP involves use of cryptographic hash functions; the...
Rodrickrodrigez asked 21/1, 2018 at 12:59

5

Solved

I've seen plenty of encryption/decryption tutorials and examples on the net in C# that use the System.Security.Cryptography.RSACryptoServiceProvider, but what I'm hoping to be able to do is: Crea...
Xl asked 15/6, 2013 at 21:25

7

Solved

I'm new to encryption. I need to implement asymmetric encryption algorithm, which i think it uses private/public key. I started using a sample of RSACryptoServiceProvider. it was ok with small data...
Polytonality asked 29/7, 2009 at 9:34

3

What's the best way to implement password hashing and verification in node.js using only the built-in crypto module. Basically what is needed: function passwordHash(password) {} // => passwordHa...
Milfordmilhaud asked 15/7, 2020 at 6:40

6

java.security.PublicKey#getEncoded() returns X509 representation of key which in case of ECC adds a lot of overhead compared to raw ECC values. I'd like to be able to convert PublicKey to byte arr...
Lammergeier asked 27/1, 2015 at 14:20

2

Let's say I have three certificates (in Base64 format) Root | --- CA | --- Cert (client/signing/whatever) How can I validate the certs and certificate path/chain in C#? (All those three cert...
Zhao asked 7/9, 2011 at 9:37

3

Solved

I am using the webcrypto API with some success to encrypt messages between server and client (lets assume I need to do this manually). My problem is that I need to check if a keypair for the user ...
Claw asked 25/3, 2018 at 16:41

5

Solved

In javascript, is it possible to use the browser built-in sha256 hash (https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/digest#Converting_a_digest_to_a_hex_string) inside a synchronous...
Walachia asked 23/8, 2019 at 12:36

2

I'm trying to install cryptography to my system, but I get this error: WARNING: Missing build requirements in pyproject.toml for cryptography from https://files.pythonhosted.org/packages/07/ca/bc...
Hysterical asked 2/5, 2019 at 14:55

1

I am communicating with our clients server. For an api I need to sign a string with my private key. They have the following condition to follow User SHA 256 algorithm to calculate the hash of the...
Camarata asked 2/1, 2020 at 11:28

10

Solved

How do I generate cryptographically secure random numbers in javascript?
Sair asked 3/11, 2010 at 0:11

3

Solved

How can I get HMAC-SHA512(key, data) in the browser using Crypto Web API (window.crypto)? Currently I am using CryptoJS library and it is pretty simple: CryptoJS.HmacSHA512("myawesomedata", "myse...
Jus asked 16/11, 2017 at 12:0

3

Solved

I have that code to encrypt string to sha256 and next to base64: public static string Sha256encrypt(string phrase) { UTF8Encoding encoder = new UTF8Encoding(); SHA256Managed sha256hasher = new...
Sanctify asked 22/4, 2012 at 20:3

8

Solved

How can I convert the hashed result, which is a byte array, to a string? byte[] bytePassword = Encoding.UTF8.GetBytes(password); using (MD5 md5 = MD5.Create()) { byte[] byteHashedPassword = md5....
Neale asked 12/3, 2010 at 20:35

6

Solved

Surprisingly difficult to find a straight answer to this on Google. I'm wanting to collect a piece of text and a message from a user such as 1PWP7a6xgoYx81VZocrDr5okEEcnqKkyDc hello world. Then I...
Beore asked 3/3, 2017 at 0:2

3

Solved

Is there a way to validate in java if the given private key, say certain *.key file matches with the certain public key, to a certain .pub file using RSA algorithm?
Olsson asked 22/3, 2018 at 10:55

10

Solved

We are using bcrypt for hashing passwords and data that never needs to be decrypted. What should we do to protect other user information that does need to be decrypted? For example, let's say that ...
Serialize asked 5/8, 2011 at 8:10

6

Solved

The new SQRL authentication scheme relies on Curve Ed25519 encryption developed by Daniel Bernstein. However, in order to start implementing this scheme there needs to be a mature implementation of...
Tennietenniel asked 2/10, 2013 at 22:6

4

Solved

I wanted to ask how to retrieve the actual values of the private and public keys from the KeyPair object because i need to export them and save in a database. KeyPairGenerator kpg = KeyPairGenerat...
Vendace asked 6/11, 2013 at 17:20

8

Solved

Information theory comes into play where ever encoding & decoding is present. For example: compression(multimedia), cryptography. In Information Theory we encounter terms like "Entropy", "Self...

1

Solved

I'm trying to exchange public keys between Browser and Server, and generate secret to be used for encryption of data. I'm trying to utilize ECDH (Elliptic Curve Diffie-Hellman). On the Server side ...

6

Solved

I need fast way for generating random strings a-Z0-9 in PHP. I've been doing some thinking and testing, this is what I've got so far: function randStr($length) { $result = null; $replace = array...
Goose asked 21/1, 2011 at 9:53

6

Solved

I am trying to transfer a custom SPL token with the solana-wallet adapter. However I am having trouble getting the wallet's secret key/signing the transaction. I've looked at these answers for writ...
Sanjak asked 4/12, 2021 at 8:41

7

Solved

I understand you can generate a random number in JavaScript within a range using this function: function getRandomInt (min, max) { return Math.floor(Math.random() * (max - min + 1)) + min; } Co...
Andrien asked 14/8, 2013 at 11:14

22

Solved

When I make an SSL connection with some IRC servers (but not others - presumably due to the server's preferred encryption method) I get the following exception: Caused by: java.lang.RuntimeExcepti...
Fullblooded asked 27/7, 2011 at 21:29

© 2022 - 2024 — McMap. All rights reserved.