Skip to main content

All Questions

0votes
1answer
125views

Soundex and encryption : good friend?

We are considering using the Soundex algorithm to improve our search capabilities in our app. Our app data are encrypted in the DB. (EAS256) The Soundex result will be stored in clear next to our ...
Marc Alves's user avatar
1vote
2answers
1kviews

Length of AES "plain text" when decrypted with wrong key

If I encrypt a text X using key A with the AES algorithms, and then decrypt the result using key B, would the obtained plain text Y length be the same as X's? If the answer is no, is there any ...
Lucas's user avatar
2votes
4answers
3kviews

About the AES algorithm key and ciphertext

I have the two following questions about the AES algorithm: A- Does the key need to follow any specific pattern apart from length or can it be a completely random string? So, if I select 16 random ...
Lucas's user avatar
5votes
1answer
755views

Is rounds in a cryptography algorithm same as iterating the algorithm?

In a cryptography algorithm such as AES or DES, does the number of rounds mean same as iterating the algorithm? Example: c= "plaintext"; for(int i=0;i<5; i++) { c = AES(c , "key"); } Where c ...
A. Sinha's user avatar
10votes
2answers
1kviews

Unseen.is encryption claims revisited with their proprietary, patented "xAES" algorithm

I had asked last year about the encryption claims by the web service called https://unseen.is. The very same service that had claims of "beyond army level encryption", "4096 bit keys" etc. This is the ...
Harry Greenwald's user avatar
-1votes
1answer
988views

Permutation in Block Ciphers

I was reading some e-books to understand the basics of block ciphers and how it works in AES. As i understood, Permutation plays a big part in AES and Block Ciphers, Here is what i understood by ...
Sufiyan Ghori's user avatar

close