Skip to main content

All Questions

0 votes
0 answers
82 views

NTRU - How is the master key and session key generated?

I am learning the PKC topics and would like to understand about the master and session key generation process regarding NTRU. Let's make it a scenario, if a user wants to register during the ...
Chris Lo's user avatar
1 vote
1 answer
310 views

GPG can't decrypt my data because of an invalid packet

I have an encrypted data containig some of my data that I am unable to decrypt. It is archived with tar, compressed with gzip and encrypted with gnupg. Today I tried to decrypt it with gpg and it ...
Nicolas Dumitru's user avatar
0 votes
0 answers
112 views

Why doesn't file/folder encryption work the way I imagine it should? Can I have the UX I want? Tell me what's wrong with this idea

I have been looking around at various encryption schemes, and I haven't found anything exactly like what I want in terms of user experience. If what I want isn't a thing, I assume it's been thought of,...
Stonecraft's user avatar
0 votes
0 answers
127 views

Choosing Encryption Strategies for Secure Long-Term Storage of Sensitive Data

When considering external drives for secure long-term storage of sensitive data, what are the pros and cons of using the same password for encrypting all files versus using random passwords for each ...
S. G.'s user avatar
  • 173
3 votes
2 answers
776 views

TPM - ECC based encryption / decryption using the public key

Our device comes with a device certificate which was signed with our private registration authority (CA). The private key (type ECC) was generated on the device itself - to be more specific directly ...
TrinityTonic's user avatar
1 vote
1 answer
272 views

How to protect files in use on a system powered on from physical theft or tampering?

I'm in the process of figuring out an encryption strategy for a personal Linux system. My laptop is almost always on, or in sleep mode, except for longer travels. My main threats are theft of my ...
CryptGuest's user avatar
1 vote
1 answer
137 views

AEAD: Authenticating a digest of my data instead the data itself

Relevant question for Python: Stack Exchange: https://stackoverflow.com/questions/75739308/aead-authentication-with-huge-input-that-doesnt-fit-into-ram Top Answers: https://topanswers.xyz/python?q=...
user2373145's user avatar
0 votes
1 answer
246 views

How does Ransomware encrypt files? [duplicate]

I have a question about how ransomware works. According to the authors of this paper: https://www.cise.ufl.edu/~traynor/papers/scaife-icdcs16.pdf (page 2 - 3) , class C is: ransomware reads the ...
Pieter Jansen's user avatar
1 vote
1 answer
1k views

Android File Encryption without screen lock

I am trying to understand the FBE Key generation and verification process at every boot. My device is going to be handled without a lock screen (Android 11 with FBE + Metadata Encryption Enabled), so ...
Sneha Sharma's user avatar
0 votes
2 answers
497 views

Ransomware public key: can I find the respective private key?

I got a ransomware called StopDjvu. On my PC, I have found the public key that is used by the malware (maybe RSA hardcoded). Is it possible to extract the private key from the public key?
ransomhate's user avatar
1 vote
1 answer
411 views

Why does some Ransomware encrypt also the file header and trailer?

Some time ago I read an article that mentioned that it is possible for some ransomware to change the magic numbers of a file (that makes sense). However, the authors claimed that their method was ...
Moooz's user avatar
  • 45
1 vote
2 answers
208 views

Encryption method for file that can only be read by program

I have a Python 3 program, and I’m having trouble finding an encryption method that will suit my needs. Suppose the program is on a thumb drive. I would give the thumb drive to someone else, and they ...
Cannabijoy's user avatar
1 vote
1 answer
130 views

can these encryption methods for a text file protect against physical access to machine by adversary?

My threat model is that, the adversary has physical access to the machine and root access. I don't care about any data on the system other than a couple python scripts that contain sensitive ...
an0nhi11's user avatar
1 vote
1 answer
1k views

How to fix import private key in GPG?

Since, I am new to gpg I wanted to generate a key pair. So I typed gpg --full-gen-key and inputted the following: root@kali-linux:~# gpg --full-gen-key gpg (GnuPG) 2.2.35; Copyright (C) 2022 g10 Code ...
Machinexa's user avatar
  • 113
0 votes
1 answer
269 views

How secure is a bitlocker startup key on a mountable encrypted container?

Let's say I want to protect the contents of my Desktop PC which I use in quite many occasions remotely. I want to use Bitlocker with a startup key that only "activates" at a specific moment ...
maximusboscus's user avatar

15 30 50 per page
1
2 3 4 5
16