Skip to main content

All Questions

Tagged with
0 votes
1 answer
36 views

Assure Deterministic Hashing/Encryption Process can be Replicated if Rebuilt

May I have some guidance for a project I am working on? These are the requirements: A Dataset needs to be submitted in a .csv format, delimited by '|' The Dataset needs to be submitted periodically (...
Clifford Piehl's user avatar
0 votes
1 answer
58 views

Question about storing salt values and hashed passwords in the database [duplicate]

So I was reading through an article about how passwords are salted and hashed through a cryptographic function here, and found out that hashed passwords, along with the plaintext salt values are ...
mantot123's user avatar
0 votes
1 answer
66 views

Storing the hash of the plaintext and the encrypted plaintext next to each other [closed]

I generate a random string of 32 characters and then compute the SHA-512 hash then I encrypt the unhashed string. I then save the encrypted text and hash to the database. Is it okay to store the hash ...
user avatar
0 votes
1 answer
215 views

Passwords/password hashes in plaintext in service configs - why is this common practice?

A while ago I wanted to deploy a service using a OCI (docker/podman) container, and I noticed to me, what seemed like a possibly distributing trend. In the build file for a lot of the containers, the ...
The Floating Brain's user avatar
0 votes
0 answers
188 views

Mixing argon2/HKDF to generate both password hash and encryption key?

I am trying to use a user password in my application to both generate a password hash (for authentication) and to derive a secret key to encrypt user data. Using argon2 is an expensive operation so i ...
codestation's user avatar
0 votes
0 answers
84 views

PGP keys as a hashing method

The context is described in another of my question, and is as follow : i've got to securely store identifiers, called TIP. We need (1) a method to derive always the same UID from a TIP, so that no ...
aluriak's user avatar
  • 133
1 vote
1 answer
124 views

Key Hash With Securely-Optimal Setting : For Encryption vs For Password

Do you have to make a key hash with securely-optimum setting (eg. 100MB memlimit, 3 opslimit) for encryption ? So I'm making a text encryption function with javascript, using XChaCha20-Poly1305 and ...
Agus Setiawan's user avatar
2 votes
2 answers
576 views

Is a leaked encrypted password more secure than a leaked hash?

Encryption tech is obviously intended to secure things that we want to be private over an insecure medium. When I log into a site for example, my password is transmitted over HTTPS, hashed by the ...
joshperry's user avatar
  • 411
1 vote
1 answer
561 views

What is the effect of salt and no. of rounds in mkpasswd encryption?

I'm currently trying to understand how salting and no. of rounds work using mkpasswd. These are the commands that I have been experimenting around. cp@cp-vm:~/Asg2_Task1b$ time mkpasswd -m sha-512 ...
Chloe's user avatar
  • 11
4 votes
4 answers
906 views

Using hashed trigrams to search over encrypted data

For practice, I write let's call it a notebook app that stores users' notes in AES-encrypted form. For encryption, I use a password-based intermediate key technique as described here. Actually, the ...
v_slav.b's user avatar
1 vote
0 answers
34 views

How should an argon2 hash be stored? [duplicate]

Given the following argon2 hash $argon2id$v=19$m=65536,t=32,p=8$mJmKA5qamzXOPJZYw4wCEUKY$COkMH0RckaZ/3bhYCdCQjLuzoLKxcAmk4TzmHRRgTQ8 How should the hash be stored in a database? From the answers of ...
Zack.B_'s user avatar
  • 11
0 votes
1 answer
535 views

Generating AES 256 key from ECDH P-384

Is there anything wrong with hashing(with SHA256) the shared secret generated by ECDH that is 384 bits long and using that as the AES key? Is there a difference between that and, say, truncating the ...
Ognjen Bjeletic's user avatar
1 vote
1 answer
119 views

Microsoft Teams encryption verification

This link suggests that MS Teams calls are encrypted and can be verified by reading out the 20-digit security codes found on the endpoint computers. To protect against a man-in-the-middle attack ...
Watki02's user avatar
  • 163
2 votes
1 answer
2k views

What's the use of HMAC or hashing in TLS or SSL inspection

In the Server hello, I got the below Cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Now, I know that we are using DHE for the key exchange, we are using RSA for the authentication, and AES for the ...
Shashank Kumar's user avatar
2 votes
2 answers
581 views

Using hash to search encrypted records

If I am using SHA-512 hash values merely as a means to search fields that have been encrypted elsewhere, is it cryptographically secure enough to hash without salt? For background, I have been given a ...
Arlo Guthrie's user avatar

15 30 50 per page
1
2 3 4 5
21