cryptography

  1. Is it secure to use a keystore that stores the password as a reversibly encoded string?

  2. Does "crypto offloading" require the use of ASICs? Can the concept be applied elsewhere?

  3. How can i calculate the number of possible passwords?

  4. Unix command to generate cryptographically secure random string
  5. Why can RSA-OAEP padded mail be decrypted using OpenSSL 1.0.1e?

  6. Google App Script as public gateway for database (spreadsheet)
  7. Is it good practice to store information about a subkey inside a hash?

  8. Secret Santa - implementation that does not require a participant to trust the server
  9. Are giant shell scripts ideal for the governance of a git repository?

  10. Dictionary Attack on SHA-1 hashes
  11. Padlocks suitable as teaching aids for public key cryptography - do they exist?

  12. TLS, how to share the symmetric key in a safe way
  13. Which is the correct algorithm while checksumming a portion of code?

  14. Key Management TCP

  15. number of ciphertext-plaintext pairs needed in double encryption
  16. Securing .so file access permissions

  17. Password Hashing: add salt + pepper or is salt enough?
  18. Programming of cryptography Algorithm
  19. Are there any serious problems with this technique for generating symmetric keys?
  20. Can I use /dev/urandom for generating cryptographic keys?

  21. How does digital signatures provide integrity?

  22. Why does WannaCry use different AES keys to encrypt different files on host?
  23. How does master secret calculates in encryption protocol used by WhatsApp?

  24. Which block cipher should be used in TLS 1.2 (while keeping 1.3 in mind)?
  25. Is this usage of AES-CBC dangerous

  26. Encrypt and Data-Integrity: h=CRC-8(m) and c=Encrypt(k,m) then send (h,c) over a channel. Secure?

  27. What is stronger - WPA2 Enterprise with 2048 bit key, or Personal with 63 character passphrase?
  28. CryptoAPI to CommonCrypto with RC4
  29. SSH ED25519 Key Extract pk (32 bit)
  30. GETRANDOM syscall's relation to kernel entropy pool state

  31. Encryption on the GPU, safer or not?

  32. How to make sure that the public key has not been tampered with during transit?

  33. For what malicious activity can one use a computer with a high-end GPU?
  34. Tor: Is a diffie-helman key exchange being done over reciepient of traffic?
  35. Why is Math.random() not designed to be cryptographically secure?

  36. Is signing safe from brute force attacks?

  37. how to discover what encryption model is used and how to discover encryption key

  38. Online Diffe-Hellman Tool

  39. How can I explain "zero knowledge proof" to an end user?
  40. How does OpenSSL generate a big prime number so fast?
  41. Diffie Hellman vs Three Pass Exchange
  42. SSH key based login is not vulenerable to MiTM attack. Is it true?

  43. Store encrypted user data in database
  44. Authentication of an indefinite number of technicians in an offline scenario

  45. Does a signed hash reveal any information about the original message?

  46. TLS 1.2 and enable only AEAD ciphers suite list

  47. Do symmetric cryptographic primitives provide both integrity and confidentiality?

  48. Is it safe to include the IV at the end of a hash?

  49. Why does TLS 1.3 deprecate custom DHE groups?

  50. What kind of encryption is generally used for api keys?

  51. In cyptography what is "Key Space"?

  52. Secure keys in hardware
  53. RSA relation to SSH key exchange
  54. How do Access Points manage attempted Passwords?
  55. Modeling a per-process file based encryption for linux

  56. Encrypting file in Javascript before sending them to Google Storage

  57. Securing hotspot with maintaining Deep packet ─░nspection
  58. How to determine what type of encoding/encryption has been used?

  59. Hide algorithm and variables
  60. How to store data on server without an ability to read it?
  61. What approaches exist for ensuring security when deploying software in non-trusted environments?

  62. Would it be okay to check only a part of a hash value

  63. Why does Windows still use a weak hashing algorthim to protect passwords?
  64. Encryption and Hash in Veracrypt

  65. Would an encryption scheme that generates an extra key to be securely stored offsite be a safe backdoor?
  66. Visual verification of DH parameter hashes vs derived password hashes
  67. Can you construct a non-lossy steganographic filesystem
  68. How can I export my private key from a Java Keytool keystore?

  69. Can a bitcoin hierarchical deterministic type 2 wallet be brute forced?
  70. Why would be an attacker interested in whether a cryptographic key exchange protocol succeeded or not?

  71. What is the proper server-side mitigation for the Lucky13 vulnerability (CVE-2013-0169) on a Windows server?

  72. Collision Free and Keyed-Hash Message Authentication Code

  73. What is the name of this type of attack using transparent encryption?
  74. How does mail email services decrypt an encrypted mail without having the sender's Public Key?
  75. is it secure to use sha256 to hash 64 cryptographically random byte data with 12 byte salt?

  76. Is it possible to use a public key directly with smime or enc in openssl while encrypting a file?

  77. Is it ok to use 6 as a cost of bcrypt algortihm for 64 chars string?

  78. What is the purpose of associated authenticated data in AEAD?
  79. Using an in-browser tabula recta to generate passwords

  80. Can a really simple example be created

  81. How secure is Ubuntu's default full-disk encryption?

  82. Generate new key - ECC vs RSA

  83. How server ensures mobile application is running in TEE?

  84. HTTPS flow clarification

  85. does anyone know how this text is encrypted?

  86. Should RSA public exponent be only in {3, 5, 17, 257 or 65537} due to security considerations?
  87. How often ciphers are used through an IPSEC session

  88. How does the Signal Protocol, used by WhatsApp, work?

  89. RSA blind signature vs signing a *random* hash
  90. Preventing fraud in bitcoin mining pools

  91. Is salting a hash really as secure as common knowledge implies?

  92. Are there techniques or methods to develop security protocols without side channel attacks?

  93. Does prepending a salt to the password instead of inserting it in the middle decrease security?

  94. What is the Highest Level of Encryption (As of 2018)
  95. Are passwords longer than 128 bits useless if hashed with MD5?
  96. Does storing two components of a secret in two places increase safety?

  97. TrueCrypt dataleaks that might betray the "Deniable File System" option

  98. Why shouldn't we roll our own?

  99. Two takes on PHP two way encryption - which one is preferable?

  100. How many iterations of Rabin-Miller should be used to generate cryptographic safe primes?