Skip to main content

Questions tagged [algorithm]

Algorithm is a set of step-by-step operations to be performed including calculations, data processing, and automated reasoning.

0votes
0answers
48views

How to determine what was done to the string before it was hashed? [duplicate]

I know the plaintext of this hash is no input 86E80EBA5AF396507BCE69ADE203A489F8BB2319 and this hash is cuttingsteel1952: B493394637ED3C2E25D84F71AF2F0BA0C0B55070 How do I identify the hash algorithm ...
Dude Jones's user avatar
2votes
1answer
470views

What encryption algorithm is putty using?

I have setup an AlmaLinux9 server with SSHD. I have also generated a priv+pub key on my workstation, and when I check the algorithm used by my key it shows: ssh-keygen -l -f myprivatekey.pem 2048 ...
TSG's user avatar
  • 189
0votes
2answers
205views

How bad would a Hash algorithm leak would be?

Context: When the Twitch whole code repository was leaked, it created multiple discussions on social medias. And one day I was on Reddit and said that the leak of the hashing algorithm and the salt ...
CARLOS EDUARDO NISHI's user avatar
1vote
2answers
360views

How can I encrypt a string of text so I can write it on paper?

How can I encrypt a string of information and put it on a piece of paper and be able to plug that encrypted text back into the algorithm with a password and unlock the information? Is this secure?
prestonferry's user avatar
1vote
0answers
99views

Hash function the other way around [closed]

Is there anything that works like the opposite of a hash algorithm? Today we know many hash algorithms, which take an input, perform some math on it, and output a value which is different than the ...
Finn 's user avatar
1vote
1answer
242views

Which algorithm does CryptGenRandom use on my laptop?

I have an Ideapad Gaming laptop by Lenovo, with an Intel(R) Core(TM) i5-10300H processor. On this laptop I have Windows 10 installed. To generate random numbers, I use the CryptGenRandom function. ...
Riemann's user avatar
0votes
1answer
2kviews

Cipher Suites settings wrong order?

I'm trying to setup a custom order of TLS cipher suites according to this Microsoft list, on Windows Server 2022 but the outcome is not the one that I was expecting. After using the powershell to ...
cadobe's user avatar
0votes
3answers
3kviews

How is one supposed to choose between encryption algorithms/settings in VeraCrypt? [duplicate]

Every single time I install an new storage device, I'm faced with the same impossible task: how to determine what is the most secure encryption algorithm/settings? Over the years, I have basically ...
Marquavion's user avatar
2votes
3answers
431views

Best way to bruteforce a list of hashed integers?

I have a list of hashes, I need to find the original value of any of them. So far I know that the hashes are only numbers of length 30. The format should be something like ...
Spiral's user avatar
0votes
0answers
878views

IIS Crypto 3.2 not getting rid of Diffie-Hellman algorithms of less than 2048-bits

I'm trying to stop a server using Diffie Hellman key exchanges of less than 2048 bits, but I'm getting confusing results. I've run Get-TlsCipherSuite | Format-Table Name, Exchange, Cipher, Hash, ...
Mick8695's user avatar
2votes
1answer
375views

Always leaking ext4 superblock

An encrypted ext4 container will always leak the superblock information. So encrypting an unencrypted metadata file system like ext4 is inherently vulnerable because it instaleaks? Shouldn't it then ...
user145453's user avatar
0votes
1answer
125views

Soundex and encryption : good friend?

We are considering using the Soundex algorithm to improve our search capabilities in our app. Our app data are encrypted in the DB. (EAS256) The Soundex result will be stored in clear next to our ...
Marc Alves's user avatar
5votes
1answer
911views

Asymmetric encryption of very small messages

I am working on an application which has a requirement to send very small messages (<64 bits), asynchronously, and using secure asymmetric encryption. We've experimented with simple RSA + OAEP, and ...
superstator's user avatar
3votes
1answer
775views

Is there a well-defined algorithm to find preimages in MD5?

I know MD5 is no longer secure, but is there an algorithm running in polynomial time to find preimages of a given hash, or is it just bruteforce?
hehehe's user avatar
0votes
1answer
1kviews

Encryption Algorithm With Separate One-Way (Hashing) And Two-Way (Decryption) Keys

In cryptography, generally we have two ways of handling sensitive information. We can use one-way encryption such as hashing. This is useful when we never need to retrieve it again. In this case, we ...
azoundria's user avatar

153050per page
close