All Questions
Tagged with encryption hash
314
questions
0
votes
1
answer
36
views
Assure Deterministic Hashing/Encryption Process can be Replicated if Rebuilt
May I have some guidance for a project I am working on?
These are the requirements:
A Dataset needs to be submitted in a .csv format, delimited by '|'
The Dataset needs to be submitted periodically (...
0
votes
1
answer
58
views
Question about storing salt values and hashed passwords in the database [duplicate]
So I was reading through an article about how passwords are salted and hashed through a cryptographic function here, and found out that hashed passwords, along with the plaintext salt values are ...
0
votes
1
answer
66
views
Storing the hash of the plaintext and the encrypted plaintext next to each other [closed]
I generate a random string of 32 characters and then compute the SHA-512 hash then I encrypt the unhashed string. I then save the encrypted text and hash to the database. Is it okay to store the hash ...
0
votes
1
answer
215
views
Passwords/password hashes in plaintext in service configs - why is this common practice?
A while ago I wanted to deploy a service using a OCI (docker/podman) container, and I noticed to me, what seemed like a possibly distributing trend. In the build file for a lot of the containers, the ...
0
votes
0
answers
188
views
Mixing argon2/HKDF to generate both password hash and encryption key?
I am trying to use a user password in my application to both generate a password hash (for authentication) and to derive a secret key to encrypt user data.
Using argon2 is an expensive operation so i ...
0
votes
0
answers
84
views
PGP keys as a hashing method
The context is described in another of my question, and is as follow : i've got to securely store identifiers, called TIP. We need (1) a method to derive always the same UID from a TIP, so that no ...
1
vote
1
answer
124
views
Key Hash With Securely-Optimal Setting : For Encryption vs For Password
Do you have to make a key hash with securely-optimum setting (eg. 100MB memlimit, 3 opslimit) for encryption ?
So I'm making a text encryption function with javascript, using XChaCha20-Poly1305 and ...
2
votes
2
answers
576
views
Is a leaked encrypted password more secure than a leaked hash?
Encryption tech is obviously intended to secure things that we want to be private over an insecure medium. When I log into a site for example, my password is transmitted over HTTPS, hashed by the ...
1
vote
1
answer
561
views
What is the effect of salt and no. of rounds in mkpasswd encryption?
I'm currently trying to understand how salting and no. of rounds work using mkpasswd. These are the commands that I have been experimenting around.
cp@cp-vm:~/Asg2_Task1b$ time mkpasswd -m sha-512 ...
4
votes
4
answers
906
views
Using hashed trigrams to search over encrypted data
For practice, I write let's call it a notebook app that stores users' notes in AES-encrypted form. For encryption, I use a password-based intermediate key technique as described here. Actually, the ...
1
vote
0
answers
34
views
How should an argon2 hash be stored? [duplicate]
Given the following argon2 hash
$argon2id$v=19$m=65536,t=32,p=8$mJmKA5qamzXOPJZYw4wCEUKY$COkMH0RckaZ/3bhYCdCQjLuzoLKxcAmk4TzmHRRgTQ8
How should the hash be stored in a database? From the answers of ...
0
votes
1
answer
535
views
Generating AES 256 key from ECDH P-384
Is there anything wrong with hashing(with SHA256) the shared secret generated by ECDH that is 384 bits long and using that as the AES key? Is there a difference between that and, say, truncating the ...
1
vote
1
answer
119
views
Microsoft Teams encryption verification
This link suggests that MS Teams calls are encrypted and can be verified by reading out the 20-digit security codes found on the endpoint computers.
To protect against a man-in-the-middle attack ...
2
votes
1
answer
2k
views
What's the use of HMAC or hashing in TLS or SSL inspection
In the Server hello, I got the below Cipher suite
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
Now, I know that we are using DHE for the key exchange, we are using RSA for the authentication, and AES for the ...
2
votes
2
answers
581
views
Using hash to search encrypted records
If I am using SHA-512 hash values merely as a means to search fields that have been encrypted elsewhere, is it cryptographically secure enough to hash without salt?
For background, I have been given a ...