encryption-symmetric Questions

4

How exactly does encryption key rotation work? I understand it's a very good practice to continuously rotate your encryption keys for security purposes, but rotating a key would require too much wo...

5

Solved

I've spent an embarrasing number of hours trying to get Libsodium.js to work. See my fiddle demo (and code pasted below too). I keep getting Error: wrong secret key for the given ciphertext. Wh...
Citify asked 12/8, 2018 at 21:25

1

I am using Python 3 I have an Auth_INI ConfigParser file with usernames mapped to passwords. I need to encrypt the password with the password so only the password can decrypt it. > Auth_IN...

3

Solved

This is the code I use to encrypt/decrypt the data: // Set the method $method = 'AES-128-CBC'; // Set the encryption key $encryption_key = 'myencryptionkey'; // Generet a random initialisation v...
Gratitude asked 25/5, 2016 at 14:21

10

Solved

What I mean is: Original String + Salt or Key --> Encrypted String Encrypted String + Salt or Key --> Decrypted (Original String) Maybe something like: "hello world!" + "ABCD1234" --> ...
Marigraph asked 17/5, 2013 at 2:57

6

Solved

What is the simplest way of doing two way encryption in common PHP installs? I need to be able to encrypt data with a string key, and use the same key to decrypt on the other end. The security is...

10

Solved

I found an example for en/decoding strings in PHP. At first it looks very good but it wont work :-( Does anyone know what the problem is? $Pass = "Passwort"; $Clear = "Klartext"; $crypted = fnEn...
Homeward asked 6/8, 2010 at 10:8

1

Solved

I've been trying to understand how symmetric encryption works and how I can integrate it in my CLI application but I've got stuck at some point which I'm going to describe below. My use case is th...
Calm asked 24/5, 2020 at 11:53

7

Solved

We are looking to do some heavy security requirements on our project, and we need to do a lot of encryption that is highly performant. I think that I know that PKI is much slower and more complex ...

6

Solved

Does anyone know of a way to get a 256 bit key value generated from a pass phrase of any length? The encryption cannot be salted as the encrypted values need to be generated again and compared in t...
Cowpox asked 19/6, 2013 at 16:2

9

Solved

I need a simple encryption for some text strings. I want to create coupon codes and make them look cool so subsequently created code should look very different. (And besides looking cool, it should...
Tanhya asked 8/11, 2010 at 22:52

1

I would like to ask about best practices regarding a usage of an initialization vector (IV) and a key for symmetric cryptography algorithms. I want to accept messages from a client, encrypt them a...
Kampala asked 1/2, 2019 at 23:2

2

Solved

Problem Scenario: I am creating an encrypted file using OpenSSL AES-256-CBC mode in Ubuntu. openssl aes-256-cbc -a -in avengers.txt -out avengers.enc test test File Content: avengersAssemble aven...
Puck asked 13/1, 2019 at 18:35

3

Solved

I wrote this code in C# to encrypt a string with a key: private static int Bin2Dec(string num) { int _num = 0; for (int i = 0; i < num.Length; i++) _num += (int)Math.Pow(2, num.Length - i -...
Christianism asked 28/3, 2010 at 11:13

1

Solved

We have a helper class for doing encryption that, if I'm going to be honest, was probably copied from Stack Overflow years ago. Currently we're trying to port some of this code to .NET Core and w...
Ecto asked 30/11, 2018 at 14:31

2

Solved

I'm trying to sign and encode my JWt with this snippet: var claims = new Claim[] { new SomeClaimes() }; var scKey = Encoding.UTF8.GetBytes("SOME KEY"); var ecKey = Encoding.UTF8.GetBytes("SOME OTH...
Samekh asked 26/11, 2018 at 18:46

2

Solved

From what I can tell TLS works using both symmetric and assymmetric encryption. The assymmetric schemes are used to exchange keys but when and what symmetric schemes are used?

1

Solved

I need to encrypt a chat message that will be stored a database. The data is a string of characters of various lengths. I want to use the native node.js crypto library and use a symmetric encryptio...
Nahshun asked 6/9, 2018 at 21:33

4

Solved

What is considered "best practice" for encrypting certain sensitive or personally identifiable data in a SQL database (under PCI, HIPAA, or other applicable compliance standards)? There are many q...
Grammatical asked 13/3, 2014 at 16:40

3

After I have read articles about Cryptography(Symmetric and Asymmetric) methods.Many articles are telling that Private key is used to encrypt and decrypt data.Public key is used to encrypt data.But...

4

Solved

I understand that through SSL, the browser gets the public key of the secured website and through public key encryption rsa algorithm, these 2 establish session key and then continue communication ...

6

Solved

I'm using Rijndael to encrypt some sensitive data in my program. When the user enters an incorrect password, most of the time a CryptographicException is thrown with the message "Padding is invali...

6

Solved

I'm currently a student and I'm studying PHP, I'm trying to make a simple encrypt/decrypt of data in PHP. I made some online research and some of them were quite confusing(at least for me). Here's...
Innocent asked 6/6, 2012 at 14:28

5

Solved

I'm writing a piece of code to encrypt a text using symmetric encryption. But it's not coming back with the right result... from Crypto.Cipher import AES import os crypto = AES.new(os.urandom(32)...
Vervet asked 1/7, 2010 at 3:55

2

Tool : OS-Windows 7 64bit, Visual Studio 2012, 4.5 .NET Framework. Language : C#. I have created one console application. In this application I have used Data Encryption Algorithm (DES- Symmetric ...
Selfesteem asked 7/6, 2016 at 10:26

© 2022 - 2024 — McMap. All rights reserved.