cryptography Questions

6

I wanna set up scrapy cluster follow this link scrapy-cluster,Everything is ok before I run this command: pip install -r requirements.txt The requirements.txt looks like: cffi==1.2.1 characteri...
Boredom asked 14/10, 2016 at 8:9

6

Solved

We are using MySQL and developing an application where we'd like the ID sequence not to be publicly visible... the IDs are hardly top secret and there is no significant issue if someone indeed was ...
Gap asked 2/9, 2011 at 12:48

1

I'm trying to decrypt a password-encrypted private key in Java, and I've come across this previous question, but when I try the same, I get the following exception: Exception in thread "main" java...
Ecology asked 16/8, 2018 at 18:31

2

Solved

I'm trying to use the elliptic curve secp256k1 in Go with the library "crypto/x509". After the key pair generation, I obtain respectively the public key pubKey and the private key privKey. After th...
Ardine asked 25/3, 2018 at 11:19

5

I wrote a simple test program that encrypts/decrypts a message. I have a keylength: int keylength = 1024; // it can also be 2048, 4096 and max input length: int maxlen = (keylength/8)-11; and...
Neurovascular asked 13/10, 2013 at 10:25

4

Solved

I'm using AesCryptoServiceProvider to encrypt and decrypt an XML document on disk. There's an example in the MSDN reference that was helpful. I generate the AES key from the SHA-256 hash of a given...
Floury asked 29/1, 2014 at 12:3

5

Solved

In .NET 6 code from How can I SHA512 a string in C#? var data = Encoding.UTF8.GetBytes("key"); byte[] hash; using (SHA512 shaM = new SHA512Managed()) hash = shaM.ComputeHash(data); T...
Uranalysis asked 25/11, 2021 at 10:34

2

Solved

I'm playing with RSA encryption/decryption and certificates. Here specifically, I try to encrypt with the public key of a certificate, and then, when trying to decrypt with the private key correspo...
Quadriplegia asked 11/1, 2011 at 19:16

7

Solved

What are the differences between SHA1 and RSA? Are they just different algorithms or are they fundamentally (i.e. used for different things) different on some level.
Petrapetracca asked 9/4, 2009 at 10:47

0

Problem Statement: User X wants to Log In or Signup to App A and App B. Considering:- OS Environment: Android User X, Device D, App A and App B(App A and App B are two different organizations) App...
Epanodos asked 8/3, 2022 at 13:50

3

Solved

I am trying to build an openssl simple program. Here is the complete code: #include <stdio.h> #include <stdlib.h> #include <string.h> #include "openssl/aes.h" int main(int argc,...
Hyetology asked 12/6, 2012 at 20:26

4

Solved

I'm trying to encrypt file that is larger than 1GB. I don't want to read it all to memory. I chose Fernet (cryptography.fernet) for this task, because it was most recommended (faster than asymetric...
Scrawl asked 24/9, 2021 at 9:46

5

Solved

This question was apparently similar but had no answers of any kind: Programmatically create a x509 certificate for iPhone without using OpenSSL In our application (server, client), we are impleme...
Buttonhook asked 12/11, 2014 at 9:23

3

I'll try to make this succinct as possible. I want to be able to encrypt & decrypt simple strings using OpenSSL, which I have done before. HOWEVER, the following conditions must be met: Sim...
Egarton asked 14/6, 2013 at 21:41

1

I want to have a cryptographic random double, since RNGCryptoServiceProvider is obsolete in .NET 6 this question is not relevant How to generate a cryptographically secure Double between 0 and 1? R...
Anuria asked 18/2, 2022 at 23:56

7

Solved

This is how I started to get a md5 hash from a string: import "crypto/md5" var original = "my string comes here" var hash = md5.New(original) But obviously this is not how it works. Can someone...
Powe asked 4/3, 2010 at 8:47

2

Solved

I'm trying to apply HMAC-SHA1 in order to check some content but I'm unable to make it work. These are the tests I have: #[cfg(test)] mod tests { use crypto::hmac::Hmac; use crypto::mac::Mac; ...
Woodworker asked 10/2, 2019 at 18:23

2

Solved

Using the Cryptography module for Python, I want to save my generated private key in a file, to use it later on. But from the docs I was unable to find the method needed for this. from cryptogr...
Dearing asked 17/7, 2017 at 14:9

3

Solved

I have coded Rail Fence Cipher in Python. I was wondering if there could be a better solution. For those who don't know what rail fence cipher is, it is basically a method of writing plain text in...
Sundae asked 25/1, 2013 at 9:51

3

Solved

According to the books that i have read, it says that S.H.A(Secure Hash Algorithm) is collision resistant.But if the input space is a 1024 bit number and the output space is a 512 bit message diges...
Drudgery asked 12/3, 2016 at 7:26

3

Solved

Is there any fast implementation of cryptographically secure pseudorandom number generator (CSPRNG) for C# 3.0 (.NET Framework 3.5), for authentication tokens?
Sula asked 3/11, 2009 at 16:13

10

Solved

For a variety of stupid reasons, the maximum length of a given form variable that we are posting to an external server is 12 characters. I wanted to obscure that value with md5, but obviously with...
Cornelius asked 21/9, 2010 at 19:27

2

Solved

I have a JWT which is signed using Elliptic Curve ES256 am trying to validate it: eyJhbGciOiJFUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6IjEyMzQifQ.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLCJzdWIiOiJt...
Stephen asked 7/12, 2019 at 18:18

2

I'm trying to install the cryptography package within a Docker container on a Raspberry Pi. It has worked before, but, for some reason, stopped working, when I had to rebuild my container. When run...
Beast asked 27/10, 2021 at 18:44

2

Solved

I decided to write a simple RSA encryption implementation in Python, but every time I run it it prints the error IndexError: list out of range when it's decrypting and in find_key. Here's the erro...
Romaic asked 11/6, 2011 at 3:53

© 2022 - 2024 — McMap. All rights reserved.