cryptography Questions

4

Solved

I am trying to create an online database application using PHP for the server and C# form application for the client. On the server I encrypt a simple string using a public RSA key with the PHPSecL...
Menispermaceous asked 23/10, 2015 at 11:40

1

Solved

What is the recommended way of encrypting a short std::string into another std::string using the openssl C library (not the command-line tool of the same name) using a public keyfile, and knowing t...
Manifold asked 7/9, 2022 at 7:0

3

Solved

I'm trying to generate address and create transaction using nodejs and @emurgo/cardano-serialization-lib-nodejs lib (CardanoWasm). Following the docs I'm trying this: const rootkey = CardanoWasm.Bi...
Mammary asked 9/2, 2021 at 10:31

6

Solved

What is the best solution in C# for computing an "on the fly" md5 like hash of a stream of unknown length? Specifically, I want to compute a hash from data received over the network. I know I am do...
Pigeon asked 1/9, 2010 at 19:5

5

Solved

I wish to demonstrate asymmetric encryption using real-world locks. For example, I want to write a secret on a piece of paper and deposit it in a locked box. Is there a lock I can buy that comes wi...
Cinderella asked 5/2, 2010 at 13:4

2

I am trying to decrypt data using AES.GCM.The encrypted data works fine but when I try to decrypt the data using the same key it gives authentication error. Below is the code to decrypt func decryp...
Brewage asked 14/1, 2020 at 20:50

3

i want to generate random int values using System.Security.Cryptography from 0 to 26 how can i do that ? i know can use system.random to do this but i want to use System.Security.Cryptography
Mentholated asked 29/7, 2016 at 23:17

1

I am working on both encryption methods and want to convert the ECDSA key to RSA key and vice versa.
Danica asked 4/8, 2022 at 10:14

3

Solved

I need to generate cryptographically strong random numbers and byte arrays. For this purpose, I'm using Java's SecureRandom class. But I'm not sure to choose which PRNG algorithm in terms of their ...
Regrate asked 23/12, 2014 at 14:46

5

I am looking for a commutative cipher - that is E(K₁,E(K₂,P)) = E(K₂,E(K₁,P)) but is not associative - that is E(K,P) ≠ E(P,K) That rules out XOR, which otherwise would have been ok. A symme...
Dinnage asked 8/11, 2010 at 9:46

1

Solved

I need the Python code to extract from the p7s file the signature resulting from digitally signing a document, in both situations where the payload is inside of, and external to, the p7s file. I ha...
Stripper asked 13/7, 2022 at 17:29

1

Solved

I'm familiar with basic cryptography in java But have zero experience in bouncycastle, Recently I came across a requirement that needs to read an encrypted and signed file from FTP. The sender has ...
Musk asked 17/7, 2022 at 9:5

3

Solved

I want to encrypt data using public/private key technique. I mean, encrypt with the public key of receiver and the receiver can decrypt with their own private key. How can I do that? Do you have ...

2

I've been reading this article on elliptic-curve crypto and how it works: http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/ In the arti...
Hwang asked 24/3, 2015 at 19:26

1

Solved

I can successfully create an Hmac via NodeJS using the following code: (slightly altered example from : https://nodejs.org/api/crypto.html#cryptocreatehmacalgorithm-key-options) Crypto.createHmac('...
Countercharge asked 26/6, 2022 at 16:51

5

Solved

from cryptography.fernet import Fernet import base64 # Put this somewhere safe! key = Fernet.generate_key() f = Fernet() token = f.encrypt(b"A really secret message. Not for prying eyes.") token ...
Agneta asked 8/6, 2017 at 10:16

0

Microsoft IP addresses are visiting 'broken' links on my web app after sending a valid link to one of their hosted email users. I have validated this after checking 6,924 Microsoft subnets against ...
Hoiden asked 16/6, 2022 at 11:5

2

I am looking into https://github.com/str4d/ed25519-java library as well as some other libraries like BouncyCastle, but I am so far unsuccessful in generating a public key out from a private key. I ...
Bayadere asked 17/11, 2020 at 0:39

2

Solved

I am generating a KeyPair for ECC from curve 'secp128r1' using openssl Steps I followed : first I generated a private key using the command openssl ecparam -genkey -name secp128r1 -noout -ou...

3

Solved

I am using Visual Studio 2013 (C#) to digitally sign document using certificate from smartcard. I cannot identify certificate currently inserted in the card reader :( Windows copy certificates fro...
Expenditure asked 6/3, 2014 at 21:13

6

I have to generate unique URL part which will be "unguessable" and "resistant" to brute force attack. It also has to be as short as possible :) and all generated values has to be of same length. I ...
Ethe asked 30/7, 2015 at 13:55

2

Solved

code overview: The tokens are identical, but in between encryption and decryption, the encrypted object is stored into a module-level dictionary--still, the encryption token does not change. Why ...
Interlaminate asked 13/10, 2017 at 18:24

8

Solved

I am generating a 2048-bit safe prime for a Diffie-Hellman-type key, p such that p and (p-1)/2 are both prime. How few iterations of Rabin-Miller can I use on both p and (p-1)/2 and still be confi...
Great asked 13/6, 2011 at 0:8

5

We have configured a Java product to use only FIPS-validated RSA JCE crypto providers. However, the product won't work when only the RSA libraries are listed in java.security. Therefore, something ...
Applause asked 23/5, 2011 at 18:53

5

As far as I understand, RSA keys are usually generated based on a (strong) random generator. Instead, I want to create them based on a password. Or rather on its hash, for example sha512(sha512(...
Bathos asked 22/6, 2012 at 12:35

© 2022 - 2024 — McMap. All rights reserved.