Skip to main content

Questions tagged [openssl]

OpenSSL is an open source implementation of the SSL and TLS protocols. Questions about how to use the OpenSSL tools and libraries are usually better asked at Stack Overflow or Super User.

0 votes
1 answer
79 views

Source code of generating private exponent for RSA?

I'm learning math of RSA. I'm interesting about realisation of computing private expoinent in source code. Where can I read a well made implemenation? (I prefer Python or Go implementation) I tried to ...
Andrew's user avatar
  • 1
0 votes
1 answer
52 views

Is a salt necessary when using a key and an intialization vector during encryption?

I use OpenSSL to encrypt passwords. For that the parameters - $S $ salt, $K$ key, $IV$ initialization vector are used. Although the command produces the results, I am not sure if the salt is really ...
Bionix1441's user avatar
1 vote
0 answers
34 views

is there any Openssl 3.x API for enabling and disabling FIPS mode?

i'm checking to see if there is any API or mechanism to enable or disable the FIPS Mode during the run time. Currently the only way to change the FIPS mode is to enable the algorithm_sect (...
Zoeb Vora's user avatar
1 vote
0 answers
131 views

Curve448 ECC parameters for use with OpenSSL

I need to be able to deterministically generate (and re-generate) private-public ECC key pairs curve448 for ECDH from human-friendly passphrases (not necessarily human-memorable, just easy to type in),...
Logan R. Kearsley's user avatar
0 votes
0 answers
346 views

RSA decrypt using Openssl error : Public Key operation error

Hello im got stuck at ctf crypto challenge, so at the challenge is given 3 file which is flag.enc pub.key priv.key , so i tried to decrypt using openssl here is ...
iykyk's user avatar
  • 1
1 vote
2 answers
860 views

sign a JWT with RS256 using a RSA-PSS SHA256 key pair?

Given a private key using algorithm RSA-PSS with SHA256 is it possible to use this key to sign a JWT using algorith RS256 (RSA with SHA256) instead of PS256 (RSA-PSS with SHA256)? The German ...
Basti's user avatar
  • 113
0 votes
1 answer
121 views

Clarifying terms for cipher, algorithm, rsa, asymmetric, openssl

I am a self taught front-end developer and I am just trying to get my cryptography terminologies straight. I will make some statements. Can someone correct my mistakes? Question 1 I read that cipher ...
learningtech's user avatar
-1 votes
1 answer
70 views

my ciphertext and original message look like they are two different sizes

The instruction wants them the ciphertext to be the same size as the original message. The original message is "alicexoxox:bobko0oo0l:popo" I am supposed to use openSSL cli to generate a key ...
pkob1's user avatar
  • 7
1 vote
1 answer
427 views

Differences between two RSA signatures using OpenSSL

I want to sign a file called data.txt and store its signature in data.txt.sig. To create the signature, I want to use an ...
Allgaeuer's user avatar
  • 123
0 votes
0 answers
745 views

How to create RSASSA-PSS keys using openssl?

I am trying to understand the RSASSA-PSS and process of generating keys with rsassaPss. I am using below ...
Preeti 's user avatar
  • 109
0 votes
2 answers
147 views

Is signature same as hash value encrypted with the private key in openssl?

Computing the signature of hello.txt file which has the text hello in it, here is done in two steps: ...
user112060's user avatar
0 votes
1 answer
92 views

Can attackers see the values I pass on to OpenSSL API functions?

Respected community, I am using the OpenSSL API's, especially libcrypto and libssl and I am really depressed, thinking about ...
Aravind A's user avatar
  • 1,030
1 vote
0 answers
34 views

Curious behavior of EVP_DigestSign for DKIM

Difficulties porting code to OpenSSL 3 may raise some doubts on digest signing. Before version 3 came, digest signing was the only way to use ED25519. On version 3, RSA_sign() being deprecated, I ...
Ale's user avatar
  • 111
1 vote
1 answer
178 views

Regarding the Digital Signature Algorithm During Client Authentication in TLS 1.2

In TLS 1.2, when client authentication is carried out, digital signatures are utilized. However, at what point is the specific signature algorithm communicated to the server? It seems to me that the ...
dusk's user avatar
  • 11
0 votes
0 answers
36 views

How by changing ciphertext can the attacker know the length of the padding in POODLE attack

I try to understand the POODLE attack. I read that the attacker try to change one byte of the last block of the ciphertext. Becasue the last block is only have padding and the last byte is the padding ...
eitan's user avatar
  • 31

15 30 50 per page
1
2 3 4 5
25