All Questions
Tagged with encryption aes
432
questions
0
votes
0
answers
7
views
Implementing end to end encryption (react js , laravel) [migrated]
I need to implement end to end encryption between front (reactjs) and back (laravel). What I try to do is encrypt data in front using package cryptojs, send it using axios to backend, in the backend I ...
4
votes
2
answers
708
views
Omit IV for AES128-CBC when requiring to always get the same ciphertext encrypting random IDs
Imagine having images stored in a system with their 256 bit hash (BLAKE2b) as their unique ID. We want to produce a URL for each image, something like:
https://host/images/cleartext-image-ID
In order ...
0
votes
1
answer
117
views
Why Ransomware generate keypair in victim?
I read this answer Ransomware encryption keys and understood how wannacry works. But I still have a question: as I understand, the hacker will put the hacker's RSA public key in the malware, the ...
0
votes
1
answer
95
views
Assembly routine for AES CBC encrypt
I'm assuming that OpenSSL is just using these functions here. page 66 is CBC
https://www.intel.com/content/dam/develop/external/us/en/documents/aes-wp-2012-09-22-v01-165683.pdf
Can I just generate a ...
0
votes
0
answers
549
views
How can I understand the zip2john hash format?
I had a .zip file that was apparently encrypted with AES-256 deflate.
7z l -slt archive.zip | grep Method
Method = AES-256 Deflate
Then I used zip2john to get a "hash" out of it:
archive....
0
votes
0
answers
92
views
What is the best way to encrypt asymmetric metadata?
As a hobby project I'm thinking about how to write a secure chat where even all metadata are encrypted so that it is impossible to leak any (meta) information by design.
My basic idea is right now:
...
0
votes
0
answers
121
views
Backup to a remote Encrypted APFS drive mounted through Samba. Is this a sound plan?
Say I have a remote machine (something like a VPS) that I have no physical access or physical authority over other than a user on it (with root access). However, I'd like to do Time Machine backups on ...
0
votes
3
answers
376
views
AES mode for reusing same keyset
I'm building a sharing protocol where users share data. To make it so only those authorised to read the data can do it, I'm using AES256 encryption. Every authorized person has a keyset (IV & key) ...
1
vote
4
answers
279
views
Is there any benefit of encryption if the password is known?
Is there a benefit of encryption of a file (for example with AES-GCM), if the password is included alongside the encrypted data?
I know it sounds like a useless question, but I am curious about its ...
1
vote
2
answers
242
views
Recommended temporary key size for communication
What I'm going to do is use AES-256 encrypted network communication to agree upon a pseudo-random key for further communications between two peers, so that every "session" utilizes a ...
4
votes
4
answers
906
views
Using hashed trigrams to search over encrypted data
For practice, I write let's call it a notebook app that stores users' notes in AES-encrypted form. For encryption, I use a password-based intermediate key technique as described here. Actually, the ...
0
votes
1
answer
535
views
Generating AES 256 key from ECDH P-384
Is there anything wrong with hashing(with SHA256) the shared secret generated by ECDH that is 384 bits long and using that as the AES key? Is there a difference between that and, say, truncating the ...
1
vote
0
answers
140
views
Symmetric key importance During encrypt and decrypt [closed]
I am performing a small command line operation the goal is to generate a symmetric key using openssl and store the key in TPM FAPI keystore.
After modifying the symmetric key, the decryption should ...
1
vote
1
answer
100
views
How to encrypt peer data exchange?
The situation currently is as follows:
All our devices in the same network broadcast their state (alongside with unique IDs) over the network. They also listen in for broadcasts of others. Everything ...
1
vote
1
answer
302
views
Where is the AES key of ransomware stored (in the file header/trailer)?
Advanced types of Ransomware generate, usually, an AES 128 bit key (used to encrypt files, some types of ransomware use a unique AES key for each file). This key is generated on the fly. In addition, ...