All Questions
6 questions
0votes
1answer
125views
Soundex and encryption : good friend?
We are considering using the Soundex algorithm to improve our search capabilities in our app. Our app data are encrypted in the DB. (EAS256) The Soundex result will be stored in clear next to our ...
1vote
2answers
1kviews
Length of AES "plain text" when decrypted with wrong key
If I encrypt a text X using key A with the AES algorithms, and then decrypt the result using key B, would the obtained plain text Y length be the same as X's? If the answer is no, is there any ...
2votes
4answers
3kviews
About the AES algorithm key and ciphertext
I have the two following questions about the AES algorithm: A- Does the key need to follow any specific pattern apart from length or can it be a completely random string? So, if I select 16 random ...
5votes
1answer
755views
Is rounds in a cryptography algorithm same as iterating the algorithm?
In a cryptography algorithm such as AES or DES, does the number of rounds mean same as iterating the algorithm? Example: c= "plaintext"; for(int i=0;i<5; i++) { c = AES(c , "key"); } Where c ...
10votes
2answers
1kviews
Unseen.is encryption claims revisited with their proprietary, patented "xAES" algorithm
I had asked last year about the encryption claims by the web service called https://unseen.is. The very same service that had claims of "beyond army level encryption", "4096 bit keys" etc. This is the ...
-1votes
1answer
988views
Permutation in Block Ciphers
I was reading some e-books to understand the basics of block ciphers and how it works in AES. As i understood, Permutation plays a big part in AES and Block Ciphers, Here is what i understood by ...