Skip to main content

All Questions

Tagged with
0 votes
0 answers
7 views

Implementing end to end encryption (react js , laravel) [migrated]

I need to implement end to end encryption between front (reactjs) and back (laravel). What I try to do is encrypt data in front using package cryptojs, send it using axios to backend, in the backend I ...
user26307664's user avatar
4 votes
2 answers
708 views

Omit IV for AES128-CBC when requiring to always get the same ciphertext encrypting random IDs

Imagine having images stored in a system with their 256 bit hash (BLAKE2b) as their unique ID. We want to produce a URL for each image, something like: https://host/images/cleartext-image-ID In order ...
mgd's user avatar
  • 604
0 votes
1 answer
117 views

Why Ransomware generate keypair in victim?

I read this answer Ransomware encryption keys and understood how wannacry works. But I still have a question: as I understand, the hacker will put the hacker's RSA public key in the malware, the ...
Thanh's user avatar
  • 1
0 votes
1 answer
95 views

Assembly routine for AES CBC encrypt

I'm assuming that OpenSSL is just using these functions here. page 66 is CBC https://www.intel.com/content/dam/develop/external/us/en/documents/aes-wp-2012-09-22-v01-165683.pdf Can I just generate a ...
shawnixer's user avatar
0 votes
0 answers
549 views

How can I understand the zip2john hash format?

I had a .zip file that was apparently encrypted with AES-256 deflate. 7z l -slt archive.zip | grep Method Method = AES-256 Deflate Then I used zip2john to get a "hash" out of it: archive....
IRP_HANDLER's user avatar
0 votes
0 answers
92 views

What is the best way to encrypt asymmetric metadata?

As a hobby project I'm thinking about how to write a secure chat where even all metadata are encrypted so that it is impossible to leak any (meta) information by design. My basic idea is right now: ...
rekire's user avatar
  • 133
0 votes
0 answers
121 views

Backup to a remote Encrypted APFS drive mounted through Samba. Is this a sound plan?

Say I have a remote machine (something like a VPS) that I have no physical access or physical authority over other than a user on it (with root access). However, I'd like to do Time Machine backups on ...
The Quantum Physicist's user avatar
0 votes
3 answers
376 views

AES mode for reusing same keyset

I'm building a sharing protocol where users share data. To make it so only those authorised to read the data can do it, I'm using AES256 encryption. Every authorized person has a keyset (IV & key) ...
Valmond's user avatar
  • 123
1 vote
4 answers
279 views

Is there any benefit of encryption if the password is known?

Is there a benefit of encryption of a file (for example with AES-GCM), if the password is included alongside the encrypted data? I know it sounds like a useless question, but I am curious about its ...
Okoba's user avatar
  • 17
1 vote
2 answers
242 views

Recommended temporary key size for communication

What I'm going to do is use AES-256 encrypted network communication to agree upon a pseudo-random key for further communications between two peers, so that every "session" utilizes a ...
R-Rothrock's user avatar
4 votes
4 answers
906 views

Using hashed trigrams to search over encrypted data

For practice, I write let's call it a notebook app that stores users' notes in AES-encrypted form. For encryption, I use a password-based intermediate key technique as described here. Actually, the ...
v_slav.b's user avatar
0 votes
1 answer
535 views

Generating AES 256 key from ECDH P-384

Is there anything wrong with hashing(with SHA256) the shared secret generated by ECDH that is 384 bits long and using that as the AES key? Is there a difference between that and, say, truncating the ...
Ognjen Bjeletic's user avatar
1 vote
0 answers
140 views

Symmetric key importance During encrypt and decrypt [closed]

I am performing a small command line operation the goal is to generate a symmetric key using openssl and store the key in TPM FAPI keystore. After modifying the symmetric key, the decryption should ...
chandu's user avatar
  • 161
1 vote
1 answer
100 views

How to encrypt peer data exchange?

The situation currently is as follows: All our devices in the same network broadcast their state (alongside with unique IDs) over the network. They also listen in for broadcasts of others. Everything ...
SF.'s user avatar
  • 223
1 vote
1 answer
302 views

Where is the AES key of ransomware stored (in the file header/trailer)?

Advanced types of Ransomware generate, usually, an AES 128 bit key (used to encrypt files, some types of ransomware use a unique AES key for each file). This key is generated on the fly. In addition, ...
Moooz's user avatar
  • 45

15 30 50 per page
1
2 3 4 5
29