Skip to main content

All Questions

1vote
2answers
360views

How can I encrypt a string of text so I can write it on paper?

How can I encrypt a string of information and put it on a piece of paper and be able to plug that encrypted text back into the algorithm with a password and unlock the information? Is this secure?
prestonferry's user avatar
0votes
3answers
3kviews

How is one supposed to choose between encryption algorithms/settings in VeraCrypt? [duplicate]

Every single time I install an new storage device, I'm faced with the same impossible task: how to determine what is the most secure encryption algorithm/settings? Over the years, I have basically ...
Marquavion's user avatar
2votes
1answer
375views

Always leaking ext4 superblock

An encrypted ext4 container will always leak the superblock information. So encrypting an unencrypted metadata file system like ext4 is inherently vulnerable because it instaleaks? Shouldn't it then ...
user145453's user avatar
0votes
1answer
125views

Soundex and encryption : good friend?

We are considering using the Soundex algorithm to improve our search capabilities in our app. Our app data are encrypted in the DB. (EAS256) The Soundex result will be stored in clear next to our ...
Marc Alves's user avatar
0votes
1answer
1kviews

Encryption Algorithm With Separate One-Way (Hashing) And Two-Way (Decryption) Keys

In cryptography, generally we have two ways of handling sensitive information. We can use one-way encryption such as hashing. This is useful when we never need to retrieve it again. In this case, we ...
azoundria's user avatar
1vote
0answers
129views

Shuffle Tool / Software [closed]

I use GPG symmetric, to encrypt text file. Is it possible to use GPG symmetric, to encrypt a text file, and at the same time, add additional setting to the encrypted file, to give us 2 conditions: ...
leon's user avatar
1vote
1answer
941views

Thick Client memory encryption

I came across a thick client application recently. The application temporarily stores sensitive data (like username and password) in clear text in memory and the data is flushed once the user logs out ...
Jaka's user avatar
  • 182
2votes
2answers
448views

Is there such a cryptographic algorithm?

Is there such a cryptographic algorithm that will encrypt any file with a password. But when decrypting, if the password is incorrect, the file will be decrypted, but instead of relevant data there ...
optic1's user avatar
3votes
5answers
341views

Using a home-brewed hash for passwords for a insignificant website

First off: I do not, nor intend to, use a home brew hash functionality, ever. I'm aware why one shouldn't do that and have read enough topics about it to know it's foolish to do. I understand that I ...
Martijn's user avatar
1vote
2answers
1kviews

Most secure algorithms for KDF and Public Key Encryption [duplicate]

I'm developing an application which will need to derive a private/public key pair from a user provided password, and then use the public key to encrypt some text (up to 1000 characters in length) such ...
vikarjramun's user avatar
1vote
1answer
6kviews

Which algorithm is safest if we exclude AES, Twofish, Serpent and Whirpool?

TLDR: Which algorithm is safest if we exclude AES, Twofish, Serpent and Whirpool? My threat model is archiving and backing up important and private files. Files will be stored in many places ...
asdfasdf's user avatar
2votes
2answers
998views

Encryption and Hash algorithms explanation

I am using Veracrypt and there are encryption and hash algorithms Can anyone explain simply what do each algorithm does? Encryption algorithms encrypt your data/file, Hash algorithm hashes your ...
mtmoblan's user avatar
2votes
4answers
10kviews

If I have the input and output, can I know the encryption technique?

I have a program that can encrypt text, I tried to discover the encryption that is used in this program and could not figure it out, knowing that if the plaintext is P and the encrypted text is C, if ...
Null's user avatar
0votes
1answer
7kviews

What encryption algorithm outputs 22 characters string? [duplicate]

I have a bunch of encoded strings and I am trying to figure the encryption algorithm behind it. I would appreciate if you could help me find which encryption algorithm it is, or if you could point me ...
Alexandre Barfuhok's user avatar
-5votes
2answers
344views

Is this Python program secure?

Note: I'm new to information security practices so feel free to point out anything I could be doing better. Situation : I'm currently creating an encryption system for instant messaging and I want to ...
Mathix420's user avatar

153050per page
close