Questions tagged [algorithm]
Algorithm is a set of step-by-step operations to be performed including calculations, data processing, and automated reasoning.
164 questions
0votes
0answers
48views
How to determine what was done to the string before it was hashed? [duplicate]
I know the plaintext of this hash is no input 86E80EBA5AF396507BCE69ADE203A489F8BB2319 and this hash is cuttingsteel1952: B493394637ED3C2E25D84F71AF2F0BA0C0B55070 How do I identify the hash algorithm ...
2votes
1answer
470views
What encryption algorithm is putty using?
I have setup an AlmaLinux9 server with SSHD. I have also generated a priv+pub key on my workstation, and when I check the algorithm used by my key it shows: ssh-keygen -l -f myprivatekey.pem 2048 ...
0votes
2answers
205views
How bad would a Hash algorithm leak would be?
Context: When the Twitch whole code repository was leaked, it created multiple discussions on social medias. And one day I was on Reddit and said that the leak of the hashing algorithm and the salt ...
1vote
2answers
360views
How can I encrypt a string of text so I can write it on paper?
How can I encrypt a string of information and put it on a piece of paper and be able to plug that encrypted text back into the algorithm with a password and unlock the information? Is this secure?
1vote
0answers
99views
Hash function the other way around [closed]
Is there anything that works like the opposite of a hash algorithm? Today we know many hash algorithms, which take an input, perform some math on it, and output a value which is different than the ...
1vote
1answer
242views
Which algorithm does CryptGenRandom use on my laptop?
I have an Ideapad Gaming laptop by Lenovo, with an Intel(R) Core(TM) i5-10300H processor. On this laptop I have Windows 10 installed. To generate random numbers, I use the CryptGenRandom function. ...
0votes
1answer
2kviews
Cipher Suites settings wrong order?
I'm trying to setup a custom order of TLS cipher suites according to this Microsoft list, on Windows Server 2022 but the outcome is not the one that I was expecting. After using the powershell to ...
0votes
3answers
3kviews
How is one supposed to choose between encryption algorithms/settings in VeraCrypt? [duplicate]
Every single time I install an new storage device, I'm faced with the same impossible task: how to determine what is the most secure encryption algorithm/settings? Over the years, I have basically ...
2votes
3answers
431views
Best way to bruteforce a list of hashed integers?
I have a list of hashes, I need to find the original value of any of them. So far I know that the hashes are only numbers of length 30. The format should be something like ...
0votes
0answers
878views
IIS Crypto 3.2 not getting rid of Diffie-Hellman algorithms of less than 2048-bits
I'm trying to stop a server using Diffie Hellman key exchanges of less than 2048 bits, but I'm getting confusing results. I've run Get-TlsCipherSuite | Format-Table Name, Exchange, Cipher, Hash, ...
2votes
1answer
375views
Always leaking ext4 superblock
An encrypted ext4 container will always leak the superblock information. So encrypting an unencrypted metadata file system like ext4 is inherently vulnerable because it instaleaks? Shouldn't it then ...
0votes
1answer
125views
Soundex and encryption : good friend?
We are considering using the Soundex algorithm to improve our search capabilities in our app. Our app data are encrypted in the DB. (EAS256) The Soundex result will be stored in clear next to our ...
5votes
1answer
911views
Asymmetric encryption of very small messages
I am working on an application which has a requirement to send very small messages (<64 bits), asynchronously, and using secure asymmetric encryption. We've experimented with simple RSA + OAEP, and ...
3votes
1answer
775views
Is there a well-defined algorithm to find preimages in MD5?
I know MD5 is no longer secure, but is there an algorithm running in polynomial time to find preimages of a given hash, or is it just bruteforce?
0votes
1answer
1kviews
Encryption Algorithm With Separate One-Way (Hashing) And Two-Way (Decryption) Keys
In cryptography, generally we have two ways of handling sensitive information. We can use one-way encryption such as hashing. This is useful when we never need to retrieve it again. In this case, we ...