Skip to main content

Questions tagged [encryption]

Encryption is the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.

1 vote
0 answers
44 views

OpenSSH 9.6p1: What is the best key type for the ssh-keygen command through the -t option?

The ssh-keygen command to generate the pair of keys files can use the -t option. According to Ubuntu Noble's man ssh-keygen for the mentioned option, it indicates: -t dsa | ecdsa | ecdsa-sk | ed25519 |...
Manuel Jordan's user avatar
0 votes
1 answer
35 views

Assure Deterministic Hashing/Encryption Process can be Replicated if Rebuilt

May I have some guidance for a project I am working on? These are the requirements: A Dataset needs to be submitted in a .csv format, delimited by '|' The Dataset needs to be submitted periodically (...
Clifford Piehl's user avatar
0 votes
1 answer
58 views

Is a Three-Layer Post-Quantum Safe VPN Hidden Within Regular IPsec Effective Against Eavesdroppers?

I'm working on designing a VPN that is post-quantum safe while avoiding detection that it uses post-quantum cryptography. The goal is to make the use of post-quantum cryptography indistinguishable to ...
dfsg76's user avatar
  • 693
2 votes
1 answer
689 views

Benefit of splitting and routing/encrypting file packets separately?

I have something of a theoretical question - how much of a cyber benefit would there be to taking data, breaking it up and encrypting it, then sending it to the destination via multiple disparate ...
sscirrus's user avatar
  • 211
4 votes
2 answers
1k views

Securing HTTP File Transfer over local network

My intention is to transfer files between a computer and a cell phone in the same network. I have created a system consisting of two apps for this purpose (everyone should be able to use the apps): ...
12characters's user avatar
1 vote
0 answers
38 views

Mutual Authentication after ECDH Exchange with pre-shared secrets

I´m currently building a protocol, in which two parties establish a connection via ECDH Key Establishment. The shared secret after ECDH is used to derivate Keys (with HKDF) for symmetric encryption. ...
Jonas's user avatar
  • 11
2 votes
1 answer
115 views

Can I add salt to my salt for password hash? [duplicate]

Following this tutorial, I got a bunch of questions with this code : const crypto = require("crypto") async function hash(password) { return new Promise((resolve, reject) => { ...
Franco RATOVOSON's user avatar
2 votes
2 answers
112 views

How to Sniff Bluetooth Traffic and Determine Encryption on Fitness Tracker Data?

I am attempting to analyze the Bluetooth communication between a fitness tracker (GOJI ACTIVE GFITBK20 Activity Tracker) and its corresponding application (Goji Active) installed on my Android phone. ...
abdul's user avatar
  • 21
0 votes
0 answers
6 views

Could this method allow two people using weak cryptography to bootstrap their way to unbreakable cryptography (e.g. otp) [migrated]

Encryption schemes are usually explained to the general public in terms of "time required to break" where strong encryption like AES-256 should in theory take millions of years. Given that ...
Faceplanted's user avatar
4 votes
2 answers
705 views

Omit IV for AES128-CBC when requiring to always get the same ciphertext encrypting random IDs

Imagine having images stored in a system with their 256 bit hash (BLAKE2b) as their unique ID. We want to produce a URL for each image, something like: https://host/images/cleartext-image-ID In order ...
mgd's user avatar
  • 604
0 votes
0 answers
82 views

NTRU - How is the master key and session key generated?

I am learning the PKC topics and would like to understand about the master and session key generation process regarding NTRU. Let's make it a scenario, if a user wants to register during the ...
Chris Lo's user avatar
0 votes
0 answers
6 views

Sniff Bluetooth traffic using Fitness Tracker [migrated]

I am attempting to sniff the Bluetooth between the fitness tracker(GOJI ACTIVE GFITBK20 Activity Tracker) and the application(Goji Active) installed on the phone but I am unable to see any health ...
user309729's user avatar
0 votes
0 answers
27 views

The Boot Process - Sequence of Events, Boot Integrity Checks, and BitLocker OS Volume Encryption

Apologies if any of these questions have been answered previously. Also, apologies for the sheer number of questions asked here. I've done some digging, and have been unable to find a good resource ...
user309532's user avatar
0 votes
3 answers
116 views

Is Homomorphic SQL Query Encryption a good idea - and should I use It?

My web app still needs a lot of work on it in the security department, so I'm considering implementing homomorphic encryption for my SQL database- to help protect from the outcomes of SQLi. I know the ...
security_paranoid's user avatar
1 vote
1 answer
110 views

Refresh tokens for impersonating user credentials: how to implement them?

The web app I'm developing makes use of the concepts of "access token" and "refresh token", even though it uses its own auth scheme. In certain situations, the web app needs to get ...
Fabio A.'s user avatar
  • 125

15 30 50 per page
1
2 3 4 5
394