All Questions
Tagged with algorithmencryption
55 questions
1vote
2answers
360views
How can I encrypt a string of text so I can write it on paper?
How can I encrypt a string of information and put it on a piece of paper and be able to plug that encrypted text back into the algorithm with a password and unlock the information? Is this secure?
0votes
3answers
3kviews
How is one supposed to choose between encryption algorithms/settings in VeraCrypt? [duplicate]
Every single time I install an new storage device, I'm faced with the same impossible task: how to determine what is the most secure encryption algorithm/settings? Over the years, I have basically ...
2votes
1answer
375views
Always leaking ext4 superblock
An encrypted ext4 container will always leak the superblock information. So encrypting an unencrypted metadata file system like ext4 is inherently vulnerable because it instaleaks? Shouldn't it then ...
0votes
1answer
125views
Soundex and encryption : good friend?
We are considering using the Soundex algorithm to improve our search capabilities in our app. Our app data are encrypted in the DB. (EAS256) The Soundex result will be stored in clear next to our ...
0votes
1answer
1kviews
Encryption Algorithm With Separate One-Way (Hashing) And Two-Way (Decryption) Keys
In cryptography, generally we have two ways of handling sensitive information. We can use one-way encryption such as hashing. This is useful when we never need to retrieve it again. In this case, we ...
1vote
0answers
129views
Shuffle Tool / Software [closed]
I use GPG symmetric, to encrypt text file. Is it possible to use GPG symmetric, to encrypt a text file, and at the same time, add additional setting to the encrypted file, to give us 2 conditions: ...
1vote
1answer
941views
Thick Client memory encryption
I came across a thick client application recently. The application temporarily stores sensitive data (like username and password) in clear text in memory and the data is flushed once the user logs out ...
2votes
2answers
448views
Is there such a cryptographic algorithm?
Is there such a cryptographic algorithm that will encrypt any file with a password. But when decrypting, if the password is incorrect, the file will be decrypted, but instead of relevant data there ...
3votes
5answers
341views
Using a home-brewed hash for passwords for a insignificant website
First off: I do not, nor intend to, use a home brew hash functionality, ever. I'm aware why one shouldn't do that and have read enough topics about it to know it's foolish to do. I understand that I ...
1vote
2answers
1kviews
Most secure algorithms for KDF and Public Key Encryption [duplicate]
I'm developing an application which will need to derive a private/public key pair from a user provided password, and then use the public key to encrypt some text (up to 1000 characters in length) such ...
1vote
1answer
6kviews
Which algorithm is safest if we exclude AES, Twofish, Serpent and Whirpool?
TLDR: Which algorithm is safest if we exclude AES, Twofish, Serpent and Whirpool? My threat model is archiving and backing up important and private files. Files will be stored in many places ...
2votes
2answers
998views
Encryption and Hash algorithms explanation
I am using Veracrypt and there are encryption and hash algorithms Can anyone explain simply what do each algorithm does? Encryption algorithms encrypt your data/file, Hash algorithm hashes your ...
2votes
4answers
10kviews
If I have the input and output, can I know the encryption technique?
I have a program that can encrypt text, I tried to discover the encryption that is used in this program and could not figure it out, knowing that if the plaintext is P and the encrypted text is C, if ...
0votes
1answer
7kviews
What encryption algorithm outputs 22 characters string? [duplicate]
I have a bunch of encoded strings and I am trying to figure the encryption algorithm behind it. I would appreciate if you could help me find which encryption algorithm it is, or if you could point me ...
-5votes
2answers
344views
Is this Python program secure?
Note: I'm new to information security practices so feel free to point out anything I could be doing better. Situation : I'm currently creating an encryption system for instant messaging and I want to ...