encryption-symmetric Questions
2
Solved
I am trying to make sense of how to handle and manage an initilization vector and salt (when applicable) when encrypting and decrypting data using a symmetric encryption algorithm, in this case AES...
Mortenson asked 16/12, 2012 at 13:3
2
Solved
I'm trying to encrypt some (cookie) data in C# and then decrypt it in PHP. I have chosen to use Rijndael encryption. I've almost got it working, except only part of the text is decrypted! I started...
They asked 8/8, 2012 at 22:3
2
I am using a AES encryption/decryption class that needs a key value and vector value encrypt and decrypt data in an MVC3 application.
On saving the record I am encrypting the data then storing in ...
Valenta asked 7/6, 2012 at 22:55
3
Solved
I'm looking for a very simple crypt / decrypt method. I will be using always the same static key. I'm aware of the risks of this approach. Currently I'm using the following code but it does not gen...
Faiyum asked 27/1, 2012 at 9:56
1
Solved
I'm attempting to futureproof some custom software that utilizes GPG (currently v 1.4.10) to perform symmetric encryption/decryption processes. My current encryption command looks like this:
gpg -...
Moue asked 10/8, 2011 at 19:52
1
Solved
I'm wanting to encrypt some data (hopefully under five hundred bytes' worth) and store it in a QR code. Originally I wanted to use RSA, so the data would be signed with User A's private key and Use...
Hanley asked 23/6, 2011 at 0:55
1
Can some point me in the right direction?
I'd like to use JCE/JCA to derive a new key from a master secret key, How can I achieve this?
Regards.
Fated asked 22/12, 2010 at 20:30
2
Solved
Use AES/Rijndael or any symmetric encryption.
Encrypt the hidden value using itself as the key and a random IV.
Store the ciphertext + IV. Discard everything else.
To check the hash: try to decryp...
Knout asked 16/12, 2010 at 0:45
1
Solved
I'm new to implementing encryption and am still learning basics, it seems.
I have need for symmetric encryption capabilities in my open source codebase. There are three components to this system:
...
Warehouse asked 3/10, 2010 at 12:22
1
Solved
Most of the information that I found and read about properly storing passwords in a database say that I should Hash the password clear text with a unique salt value for each user and then store tha...
Circumfluent asked 7/8, 2010 at 22:17
4
Solved
OK, I'm probably just having a bad Monday, but I have the following need and I'm seeing lots of partial solutions but I'm sure I'm not the first person to need this, so I'm wondering if I'm missing...
Prae asked 24/5, 2010 at 22:40
2
Solved
So I am trying to store the symmetric key using DPAPI. All is well and great, but what to do with the entropy? This answered question here really doesn't provide enough insight. It seems like a sli...
Rosamariarosamond asked 6/4, 2010 at 14:46
4
Solved
Two clients Alice and Bob use a server to login and exchange messages through the server. On login, they both send their public keys to be stored on the server. When Alice wants to speak to Bob, sh...
Coriander asked 17/2, 2010 at 14:35
3
Solved
It seems to be confusing Triple-DES (>128bit) with plain DES (64bit).
I'm trying to encrypt a Derby database with Triple DES (or DESede) using Java 1.5
I found this discussion forum message about ...
Ritaritardando asked 17/12, 2009 at 22:47
1
Solved
I've the task to transfer small binary messages (1 or 2 kb long) between a desktop application and mobile devices. The messages should be encrypted asymmetrically (RSA for instance). From what I've...
Sheply asked 4/6, 2009 at 13:39
© 2022 - 2024 — McMap. All rights reserved.