Skip to main content

All Questions

1vote
1answer
242views

Which algorithm does CryptGenRandom use on my laptop?

I have an Ideapad Gaming laptop by Lenovo, with an Intel(R) Core(TM) i5-10300H processor. On this laptop I have Windows 10 installed. To generate random numbers, I use the CryptGenRandom function. ...
Riemann's user avatar
0votes
1answer
128views

One-way cryptographic algorithm with distinct output and verifiable property

I'm working on a API which is serving content based on user requests. What I'd like to achieve is as follows: Having a constant key stored both on the server and the client machine (as a means of ...
gringomandingo's user avatar
2votes
2answers
10kviews

Is it possible to brute-force the original message of SHA-256 given the size of original string?

Given the SHA-256 hash, the size and the encoding of the original string, is it possible to recover the string via brute force? How many string of a given size will result in the same hash?
Max's user avatar
  • 185
2votes
2answers
448views

Is there such a cryptographic algorithm?

Is there such a cryptographic algorithm that will encrypt any file with a password. But when decrypting, if the password is incorrect, the file will be decrypted, but instead of relevant data there ...
optic1's user avatar
3votes
2answers
185views

Search for existence of sensitive substring without revealing substring in cleartext

I have a list of very sensitive strings and I want to ensure that these strings do not exist in a set of documents (potentially very large documents). However, these substrings are so sensitive that ...
Matt Harrison's user avatar
1vote
2answers
5kviews

Is there a difference between encryption keys and encryption certificates?

Learning about cryptography. Experimenting with attacking the algorithm it's self. My question regards vocabulary basically. Are encryption keys and certificates the same thing or are they different? ...
Ahab Devoid's user avatar
1vote
1answer
258views

Hide algorithm and variables

I have some variables in my algorithm that I would not want others to see. Party A would write an algorithm which will use my variables. But party's A algorithm should remain hidden i.e. I should not ...
Dool's user avatar
-5votes
2answers
165views

What is the most crypto-resistive algorithm to safely send information? [closed]

What algorithm is the best to use for storing, sending passwords, account data, and other information between desktop apps over the network. Looking for the best crypto-resistive algorithm to use in ...
Markiian Benovskyi's user avatar
-1votes
1answer
321views

Is this algorithm safe for encryption? (Cryptography Algorithm is provided)

Jasoos (Cryptography Algorithm) I am working on encrypting and decrypt web application. I have built an algorithm that uses 24 bits long key to encrypt/decrypt the message. Review this algorithm and ...
gauravd2196's user avatar
33votes
5answers
8kviews

SSH - If Eve has the passphrase and public key, can she derive the private key?

I have used ssh-keygen for creating an RSA 4096-bit SSH private and public key pair. I used a passphrase for the private key. If an attacker, Eve, knows the passphrase in addition to the public key: ...
unseen_rider's user avatar
0votes
1answer
307views

What security considerations apply to a blockchain implementation for private use?

I want to know that if a company wants to implement a model of blockchain, let's say for internal transactions across its offices in different countries, what are the main and important security ...
John McKean's user avatar
-1votes
1answer
258views

What defines a "good" cryptographic algorithm? [closed]

The title pretty much says it all. I am looking for a formal definition of what a good crypto algorithm is. I cannot find anything online.
Rakim's user avatar
5votes
1answer
755views

Is rounds in a cryptography algorithm same as iterating the algorithm?

In a cryptography algorithm such as AES or DES, does the number of rounds mean same as iterating the algorithm? Example: c= "plaintext"; for(int i=0;i<5; i++) { c = AES(c , "key"); } Where c ...
A. Sinha's user avatar
-2votes
1answer
688views

Why not create your own encryption? [duplicate]

I am wondering if AES-128 and the likes were once broken and if they were broken because people knew they were trying to break AES then why don't we create our own personal algorithm to encrypt the ...
user158421's user avatar
4votes
1answer
4kviews

Is RC2-CBC at all secure?

(And more generally, is there a site listing which various algorithms are still considered secure, so I wouldn't have to ask that here? Wikipedia's "known best attack" is not particularly clear.) I ...
grawity's user avatar
  • 1,876

153050per page
close