All Questions
Tagged with encryption file-encryption
234
questions
0
votes
0
answers
82
views
NTRU - How is the master key and session key generated?
I am learning the PKC topics and would like to understand about the master and session key generation process regarding NTRU.
Let's make it a scenario, if a user wants to register during the ...
1
vote
1
answer
310
views
GPG can't decrypt my data because of an invalid packet
I have an encrypted data containig some of my data that I am unable to decrypt. It is archived with tar, compressed with gzip and encrypted with gnupg. Today I tried to decrypt it with gpg and it ...
0
votes
0
answers
112
views
Why doesn't file/folder encryption work the way I imagine it should? Can I have the UX I want? Tell me what's wrong with this idea
I have been looking around at various encryption schemes, and I haven't found anything exactly like what I want in terms of user experience.
If what I want isn't a thing, I assume it's been thought of,...
0
votes
0
answers
127
views
Choosing Encryption Strategies for Secure Long-Term Storage of Sensitive Data
When considering external drives for secure long-term storage of sensitive data, what are the pros and cons of using the same password for encrypting all files versus using random passwords for each ...
3
votes
2
answers
776
views
TPM - ECC based encryption / decryption using the public key
Our device comes with a device certificate which was signed with our private registration authority (CA). The private key (type ECC) was generated on the device itself - to be more specific directly ...
1
vote
1
answer
272
views
How to protect files in use on a system powered on from physical theft or tampering?
I'm in the process of figuring out an encryption strategy for a personal Linux system.
My laptop is almost always on, or in sleep mode, except for longer travels.
My main threats are theft of my ...
1
vote
1
answer
137
views
AEAD: Authenticating a digest of my data instead the data itself
Relevant question for Python:
Stack Exchange: https://stackoverflow.com/questions/75739308/aead-authentication-with-huge-input-that-doesnt-fit-into-ram
Top Answers: https://topanswers.xyz/python?q=...
0
votes
1
answer
246
views
How does Ransomware encrypt files? [duplicate]
I have a question about how ransomware works.
According to the authors of this paper: https://www.cise.ufl.edu/~traynor/papers/scaife-icdcs16.pdf (page 2 - 3) , class C is: ransomware reads the ...
1
vote
1
answer
1k
views
Android File Encryption without screen lock
I am trying to understand the FBE Key generation and verification process at every boot. My device is going to be handled without a lock screen (Android 11 with FBE + Metadata Encryption Enabled), so ...
0
votes
2
answers
497
views
Ransomware public key: can I find the respective private key?
I got a ransomware called StopDjvu. On my PC, I have found the public key that is used by the malware (maybe RSA hardcoded).
Is it possible to extract the private key from the public key?
1
vote
1
answer
411
views
Why does some Ransomware encrypt also the file header and trailer?
Some time ago I read an article that mentioned that it is possible for some ransomware to change the magic numbers of a file (that makes sense). However, the authors claimed that their method was ...
1
vote
2
answers
208
views
Encryption method for file that can only be read by program
I have a Python 3 program, and I’m having trouble finding an encryption method that will suit my needs.
Suppose the program is on a thumb drive. I would give the thumb drive to someone else, and they ...
1
vote
1
answer
130
views
can these encryption methods for a text file protect against physical access to machine by adversary?
My threat model is that, the adversary has physical access to the machine and root access.
I don't care about any data on the system other than a couple python scripts that contain sensitive ...
1
vote
1
answer
1k
views
How to fix import private key in GPG?
Since, I am new to gpg I wanted to generate a key pair. So I typed gpg --full-gen-key and inputted the following:
root@kali-linux:~# gpg --full-gen-key
gpg (GnuPG) 2.2.35; Copyright (C) 2022 g10 Code ...
0
votes
1
answer
269
views
How secure is a bitlocker startup key on a mountable encrypted container?
Let's say I want to protect the contents of my Desktop PC which I use in quite many occasions remotely.
I want to use Bitlocker with a startup key that only "activates" at a specific moment ...