Questions tagged [encryption]
Encryption is the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.
5,906
questions
0
votes
2
answers
150
views
Is it possible to send data from an open-source program but make it impossible for a user with source code to do the same?
If I want to store a global scoreboard for a game running locally on the user's computer and I want to make sure that all the requests coming to the server are really generated by the game and not ...
1
vote
1
answer
61
views
Allow one of many encryption/signature algorithms for single public key certificate
Let's say a user creates their primary gpg key pair for User Name <[email protected]> and selects an encryption and signing algorithm that isn't widely available (think goldilocks). For instance, ...
0
votes
1
answer
105
views
Encryption without a classic exchange scenario
I am working on a project where I need to securely encrypt and decrypt files on a product without the ability for direct communication or key derivation after the product is sold. The challenge is ...
0
votes
0
answers
88
views
What are the effective open-source methods for storing and managing encryption keys in a language-agnostic manner when an HSM is unavailable?
When HSMs are not accessible, we often need alternative methods for securely storing and managing encryption keys
What open-source options exist for effectively managing encryption keys in a language-...
0
votes
1
answer
102
views
Since devices in typical house scenario are exposed to ISP, Do anonimous OS (tails/kodachi/etc) require a different scenario to keep anonymity?
Researching on this topic I found the answer of Conor Mancone for a similar question about whether Can an ISP detect or log specific devices connected to ISP-provided home routers?, which answer was ...
0
votes
1
answer
271
views
Is the Bitlocker encryption key used on HD same for USB?
With Bitlocker, is there only one "master key" that is used to encrypt/decrypt for both HD and USB data?
I saw this article today which talks about sniffing the encryption key to get access ...
0
votes
1
answer
215
views
Passwords/password hashes in plaintext in service configs - why is this common practice?
A while ago I wanted to deploy a service using a OCI (docker/podman) container, and I noticed to me, what seemed like a possibly distributing trend. In the build file for a lot of the containers, the ...
2
votes
1
answer
161
views
Securely storing derived key in web app and handling user identity
I am currently working on an open source project to securely store notes, payment card numbers, etc. I would like to implement a zero knowledge encryption method so that no one but the user can ...
1
vote
0
answers
138
views
Encryption of calls and files in XMPP
I use Conversations, and my interlocutor is Monal (or another application for iOS (you can tell which is better)).
I plan to use OMEMO for encryption. Are files and photos encrypted or not?
Are calls ...
1
vote
2
answers
121
views
Authenticating a device for remote motor control
I'm looking for a standard solution to the following problem. I've been unable to find how something like this is normally accomplished. Even a key word that points me in the right direction would be ...
0
votes
2
answers
309
views
Is encrypting a query parameter within a URI a security best practice?
Assumption a customer is sitting in a public area connected to a public wifi. A threat actor can access the customer's browser and read all Javascript variables.
Step 1. example.com server sends the ...
1
vote
2
answers
234
views
How can I encrypt a string of text so I can write it on paper?
How can I encrypt a string of information and put it on a piece of paper and be able to plug that encrypted text back into the algorithm with a password and unlock the information? Is this secure?
0
votes
1
answer
95
views
Assembly routine for AES CBC encrypt
I'm assuming that OpenSSL is just using these functions here. page 66 is CBC
https://www.intel.com/content/dam/develop/external/us/en/documents/aes-wp-2012-09-22-v01-165683.pdf
Can I just generate a ...
0
votes
0
answers
69
views
Assessing the Implications of Using msoffcrypto for Open Sourcing a Medical Data Processing Pipeline
I am in the process of creating a Python pipeline intended for reading and processing sensitive medical personal data from password-protected Excel files. The pipeline utilizes the msoffcrypto library,...
2
votes
1
answer
353
views
What is the main difference between bcprov and bc-fips (bouncycastle) jar?
I am having difficulty understanding the differences between bc-prov and bc-fips jar. I understand bc-fips contains the subset of bc-prov packages as well. But I want to understand more about the ...