encryption-asymmetric Questions

5

Solved

I am wondering if there exists some asymmetric encryption algorithm that would work with two different private keys, so that the encrypted message can be decrypted by either one of such private key...

7

Solved

I'm new to encryption. I need to implement asymmetric encryption algorithm, which i think it uses private/public key. I started using a sample of RSACryptoServiceProvider. it was ok with small data...
Polytonality asked 29/7, 2009 at 9:34

5

Solved

I wish to demonstrate asymmetric encryption using real-world locks. For example, I want to write a secret on a piece of paper and deposit it in a locked box. Is there a lock I can buy that comes wi...
Cinderella asked 5/2, 2010 at 13:4

1

I am working on both encryption methods and want to convert the ECDSA key to RSA key and vice versa.
Danica asked 4/8, 2022 at 10:14

1

Solved

How do we use a mnemonic list of words as a seed (like we have been become accustomed using cryptocurrency wallets) to be able to recover a private key in case it gets lost, accidentally erased, or...

1

I am trying to perform Asymmetric Encryption and Decryption using RSA and OAEPPadding on actually larger data, say, 10 KB. Many Stackoverflow articles mentioned to use the Hybrid approach [Assymmet...
Disposed asked 25/2, 2022 at 15:40

1

Problem: AddJwtBearer() is failing, but verifying the token manually works. I'm trying to generate and verify a JWT with an asymmetric RSA algo. I can generate the JWT just fine using this demo co...
Crinkly asked 27/2, 2020 at 13:30

5

I need to load the following RSA public key from a file for use with the RSACryptoServiceProvider class. How can I do this? -----BEGIN PUBLIC KEY----- XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX...
Evadnee asked 16/7, 2012 at 14:54

10

Solved

From whatever little I understand by reading various material, public-private key pair are the basis of asymmetric encryption and also something about choosing 2 prime numbers (which is roughly you...
Speciosity asked 30/3, 2009 at 8:54

4

Solved

Is there a module that has my searching has been unable to discover that would allow writing code like the following? The reason for wanting to write code like this is unimportant. All I am after i...
Histrionic asked 16/12, 2011 at 19:56

1

I am creating RSA key pair using AsymmetricKeyAlgorithmProvider (Windows.Security.Cryptography.Core) and exporting the keys as shown below: AsymmetricKeyAlgorithmProvider rsaGenKeys = AsymmetricK...
Pontificate asked 16/4, 2015 at 16:22

1

Solved

"n": "rKZ-1zdz_CoLekSynOtyWv6cPSSkV28Kb9kZZHyYL-yhkKnH_bHl8OpWiGxQiKP0ulLRIaq1IhSMetkZ8FfXH-iptIDu4lPb8gt0HQYkjcy3HoaKRXBw2F8fJQO4jQ-ufR4l-E0HRqwLywzdtAImNWmju3A4kx8s0iSGHGSHyE4EUdh5...

7

Solved

What's the difference between a keystore and a truststore?
Arenas asked 25/11, 2008 at 18:38

2

Solved

Code https://play.golang.org/p/CUEqjsJq5c Error: panic: crypto/rsa: message too long for RSA public key size goroutine 1 [running]: panic(0x4a6d80, 0xc420010420) /usr/local/go/src/runtime/pani...

3

Solved

Is it possible to encrypt a message with a private key in python using pycryptodome or any other library? I know that you are not supposed to encrypt with the private key and decrypt with the publi...

4

Solved

When calling the following function : byte[] bytes = rsa.Encrypt(System.Text.UTF8Encoding.UTF8.GetBytes(stringToEncrypt), true); I am now getting the error: bad length. With a smaller string i...
Noahnoak asked 30/9, 2009 at 8:35

7

Solved

We are looking to do some heavy security requirements on our project, and we need to do a lot of encryption that is highly performant. I think that I know that PKI is much slower and more complex ...

3

Solved

I understand the difference between symmetric and asymmetric keys. I understand that the keys are used to calculate the signature and then verify them. However diving a little deeper, I'd like to u...
Squander asked 2/10, 2015 at 5:22

1

I'm using Web Crypto API and am generating RSA Keypair using generateKey function. Because of some bugs in my code, I have deleted public key for some users. I'm wondering if there is any way to ge...
Marlinmarline asked 28/6, 2019 at 13:35

6

Solved

I need to encrypt a string using a public key (.pem file), and then sign it using a private key (also a .pem). I am loading the .pem files fine: publicCert = fs.readFileSync(publicCertFile).toStrin...
Pentagrid asked 5/1, 2012 at 22:26

2

Solved

From what I can tell TLS works using both symmetric and assymmetric encryption. The assymmetric schemes are used to exchange keys but when and what symmetric schemes are used?

2

Solved

I'm currently working on an Android client of my encryption software, but I kept getting IllegalBlockSizeException, and e.getMessage() always returns null Here's the code I used to find the proble...

3

After I have read articles about Cryptography(Symmetric and Asymmetric) methods.Many articles are telling that Private key is used to encrypt and decrypt data.Public key is used to encrypt data.But...

1

I am generating an Asymmetric key pair in the Android key store as below: I have used the public key for symmetric key wrapping and storing the wrapped key to a file. When I try to unwrap symmetric...
Cardioid asked 18/1, 2018 at 13:2

2

I'm working on a web application which the users will need to submit their social security numbers. I would like to use asymmetric keys for encryption so if the web server is compromised the priva...
Weems asked 16/8, 2015 at 15:47

© 2022 - 2024 — McMap. All rights reserved.