Skip to main content

Questions tagged [encryption]

Encryption is the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.

1 vote
1 answer
18 views

ELI5: If SSL encrypts traffic, why does it expire?

SSL, nowadays TLS, encrypts traffic between the server and client. However, the certificate is only valid for a certain period of time until its expiration. What I don't understand is, why does TLS ...
MaSc. H.'s user avatar
1 vote
1 answer
39 views

Is local password recovery for each device a viable security approach?

I'm developing a multi-platform application using Flutter, which involves sensitive user data and requires both online and offline accessibility. To enhance security and usability, I am considering ...
george orwell's user avatar
4 votes
2 answers
214 views

How safe are my app's keys inside the TPM against other apps trying to impersonate mine?

This is a follow-up of these two questions about using the TPM to store application's keys. While both have great answers, there is a specific aspect I am missing: How safe are the keys inside the TPM ...
mist's user avatar
  • 113
2 votes
0 answers
62 views

Searchable encryption for phone numbers

I have a table in Postgres that stores phone numbers. Since phone numbers are considered PII, I cannot store them as plaintext. For other PII fields, I use AES-256-CBC. However, the requirements are ...
Stefan van den Akker's user avatar
0 votes
0 answers
31 views

can non-rotatable secrets be stored in ciphertext form in a DB/file/etc.?

We have a service running on AWS. This service uses secrets such as API keys of third party services (in other words: secrets which do not rotate automatically). These secrets are stored in AWS ...
Itay Maman's user avatar
0 votes
1 answer
106 views

Can we catch signals from a cellphone using AI to interpret the encrypted data?

Would it be possible for someone to steal EM waves from our mobile devices to listen to our conversations or get our OTP? Whatever encryptions they have they are just EM waves. Based on the patterns ...
Newtron Malayalam's user avatar
6 votes
2 answers
153 views

Use of TPM to encrypt data of my application in practice

I am not very familiar with TPMs, but from what I can tell their main benefit for the user is to make the system as a whole more secure, if you take the appropriate measures, e.g. by checking the boot ...
mist's user avatar
  • 113
0 votes
0 answers
7 views

Implementing end to end encryption (react js , laravel) [migrated]

I need to implement end to end encryption between front (reactjs) and back (laravel). What I try to do is encrypt data in front using package cryptojs, send it using axios to backend, in the backend I ...
user26307664's user avatar
2 votes
1 answer
65 views

Are there any motherboards / UEFI that support hardware encryption on SED?

I found that Thinkpads have hdd password support, which in terms uses some bizarre password hashing and ends up with 90 bits of entropy, which is again used as ATA security password to SED, which in ...
mmja's user avatar
  • 93
1 vote
0 answers
58 views

OpenSSH 9.6p1: What is the best key type for the ssh-keygen command through the -t option? [duplicate]

The ssh-keygen command to generate the pair of keys files can use the -t option. According to Ubuntu Noble's man ssh-keygen for the mentioned option, it indicates: -t dsa | ecdsa | ecdsa-sk | ed25519 |...
Manuel Jordan's user avatar
0 votes
1 answer
36 views

Assure Deterministic Hashing/Encryption Process can be Replicated if Rebuilt

May I have some guidance for a project I am working on? These are the requirements: A Dataset needs to be submitted in a .csv format, delimited by '|' The Dataset needs to be submitted periodically (...
Clifford Piehl's user avatar
0 votes
1 answer
65 views

Is a Three-Layer Post-Quantum Safe VPN Hidden Within Regular IPsec Effective Against Eavesdroppers?

I'm working on designing a VPN that is post-quantum safe while avoiding detection that it uses post-quantum cryptography. The goal is to make the use of post-quantum cryptography indistinguishable to ...
dfsg76's user avatar
  • 693
2 votes
1 answer
693 views

Benefit of splitting and routing/encrypting file packets separately?

I have something of a theoretical question - how much of a cyber benefit would there be to taking data, breaking it up and encrypting it, then sending it to the destination via multiple disparate ...
sscirrus's user avatar
  • 211
4 votes
2 answers
1k views

Securing HTTP File Transfer over local network

My intention is to transfer files between a computer and a cell phone in the same network. I have created a system consisting of two apps for this purpose (everyone should be able to use the apps): ...
12characters's user avatar
1 vote
0 answers
40 views

Mutual Authentication after ECDH Exchange with pre-shared secrets

I´m currently building a protocol, in which two parties establish a connection via ECDH Key Establishment. The shared secret after ECDH is used to derivate Keys (with HKDF) for symmetric encryption. ...
Jonas's user avatar
  • 11

15 30 50 per page
1
2 3 4 5
394