cryptography Questions

2

Solved

I'm trying to make some keystores using keytool from the latest JRE (version 1.8.0_151). When I create the keystore using this command keytool -genkey -alias serverprivate -keystore server.private ...
Tapir asked 4/12, 2017 at 17:37

2

Solved

I am trying to implement the function fast modular exponentiation(b, k, m) which computes: b(2k) mod m using only around 2k modular multiplications. I tried this method: def FastModularExponenti...
Drizzle asked 27/8, 2019 at 5:42

5

Solved

Can someone point out the differences between the two and example situations where use each? bcrypt looks great.
Thirtythree asked 5/8, 2011 at 5:34

2

Solved

I have a JSON object that I generate from serializeArray on a form which I would like to encrypt. The application I am working on is intended to run only as a local file. What would be the best opt...
Schmo asked 7/2, 2018 at 13:11

6

Solved

I want to use RSA public key encryption. What is the best way to store or retrieve private and public keys? Is XML a good idea here? How to get the keys? RSAParameters privateKey = RSA.ExportPara...
Vatican asked 28/7, 2009 at 11:35

3

Solved

Currently i'm updating my x.509 certificate library to support ECC. Most of the builders that are implemented take a publicKey and derive the algorithm and such from the key. In RSA this is simple,...
Mackenziemackerel asked 18/4, 2018 at 9:13

5

Solved

I am trying to interact with third party real time Web messaging System created and maintained by Pusher.com. Now, i cannot send anything through the API unless i produce an HMAC SHA256 hex digest ...
Aila asked 20/1, 2012 at 13:47

12

Solved

For each of our binary assets we generate a MD5 hash. This is used to check whether a certain binary asset is already in our application. But is it possible that two different binary assets generat...
Laurynlausanne asked 18/11, 2009 at 13:36

2

I am trying to generate exactly 6 random digits in Node.js, which needs to be cryptographically secure. Here is my code: var crypto = require('crypto'); crypto.randomBytes(2, function(err, buffer...
Tape asked 7/7, 2013 at 22:30

2

Solved

I was trying to extract RES public key from the file below -----BEGIN CERTIFICATE----- MIIGwTCCBamgAwIBAgIQDlV4zznmQiVeF45Ipc0k7DANBgkqhkiG9w0BAQUFADBmMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgS...
Dysthymia asked 10/6, 2014 at 9:28

1

Solved

I have a working solution for crypt/decrypt data in my code (below) but when I have upgraded the project to DOTNET6, RijndaelManaged becomes obsolete: Warning SYSLIB0022 'RijndaelManaged' is obsol...
Pleader asked 3/12, 2021 at 9:31

2

Solved

I'm currently getting an AEADBadTagException when trying to decrypt a file I have encrypted. I have searched pretty much everywhere on stackoverflow and unable to find a solution, and hoping there ...
Orten asked 4/12, 2018 at 21:52

4

Solved

Any recommended crypto libraries for Python. I know I've asked something similar in x509 certificate parsing libraries for Java, but I should've split the question in two. What I need is the abili...
Whinny asked 27/9, 2008 at 13:15

2

Solved

I am trying to use a SecureRandom to generate random numbers in my java project. But I am a little confused as how to keep my object for SecureRandom. Should it be a static class member. I dont int...
Synovitis asked 7/7, 2021 at 12:44

4

Solved

I'm completely new to cryptography, but learning. I've pieced together many different suggestions from my research online, and have made my own class for handling the hash, salt, key stretching, an...
Abel asked 17/9, 2014 at 19:42

8

Solved

I am trying to compute 8-character short unique random filenames for, let's say, thousands of files without probable name collision. Is this method safe enough? base64.urlsafe_b64encode(hashlib.md...
Osmose asked 21/11, 2012 at 0:52

4

Solved

Whenever I try to use MD5 on a Windows XP machine that has FIPS enabled, I am getting a System.InvalidOperationException. Is there an alternate algorithm that I should use instead of MD5 on FIPS? ...
Ethmoid asked 3/2, 2011 at 23:48

4

Solved

From Wikipedia In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algori...
Artimas asked 8/2, 2015 at 15:23

1

I am getting this error when I am decrypting the encrypted message.I fetched the the encrypted message from the db in django views as pw = donator.objects.filter(emai=email).values('passw')and pass...
Stouffer asked 6/11, 2021 at 14:47

8

I have a private key file (PEM BASE64 encoded). I want to use it else where to decrypt some other data. Below is the java class snippet to read the private key file and decode the BASE64 encoded da...
Weekly asked 27/8, 2011 at 19:51

1

Solved

I am attempting to generate a personal_sign in Golang like its implemented in ethers.js. Similar question but that ended up using the regular sign over the personal sign_implementation. Ethers // k...
Serpens asked 28/10, 2021 at 23:42

7

I want to implement a Caesar Cipher shift to increase each letter in a string by 3. I am receiving this error: possible loss of precision required char; found int Here is my code so far: imp...
Christychristye asked 1/10, 2013 at 5:37

2

Solved

I am trying to use pure .net code to create a certificate request and create a certificate from the certificate request against an existing CA certificate I have available (either in the Windows Ce...
Swen asked 10/1, 2018 at 21:27

7

Solved

Our team is using a SecureRandom to generate a list of key pairs (the SecureRandom is passed to a KeyPairGenerator). We cannot agree on which of the following two options to use: Create a new ins...
Naji asked 17/11, 2008 at 14:3

1

Solved

I'm trying to generate a pdf with LTV enabled. I generate a pkcs7 object with all the attributes necesary included the signerInfo object. The signature generated is valid but not LTV enabled. Accor...
Levitan asked 27/9, 2021 at 17:43

© 2022 - 2024 — McMap. All rights reserved.