All Questions
11 questions
2votes
2answers
448views
Is there such a cryptographic algorithm?
Is there such a cryptographic algorithm that will encrypt any file with a password. But when decrypting, if the password is incorrect, the file will be decrypted, but instead of relevant data there ...
-5votes
2answers
165views
What is the most crypto-resistive algorithm to safely send information? [closed]
What algorithm is the best to use for storing, sending passwords, account data, and other information between desktop apps over the network. Looking for the best crypto-resistive algorithm to use in ...
-1votes
1answer
321views
Is this algorithm safe for encryption? (Cryptography Algorithm is provided)
Jasoos (Cryptography Algorithm) I am working on encrypting and decrypt web application. I have built an algorithm that uses 24 bits long key to encrypt/decrypt the message. Review this algorithm and ...
0votes
1answer
307views
What security considerations apply to a blockchain implementation for private use?
I want to know that if a company wants to implement a model of blockchain, let's say for internal transactions across its offices in different countries, what are the main and important security ...
5votes
1answer
755views
Is rounds in a cryptography algorithm same as iterating the algorithm?
In a cryptography algorithm such as AES or DES, does the number of rounds mean same as iterating the algorithm? Example: c= "plaintext"; for(int i=0;i<5; i++) { c = AES(c , "key"); } Where c ...
0votes
1answer
529views
Advice on using encryption and hashing
I'm going to rephrase a question I asked earlier, as I don't think anyone understood what I meant. Basically, I'm writing a web based password locker, which can handle multiple accounts; users can ...
1vote
2answers
314views
Safely share passwords between users [closed]
I'm writing a project to securely store and share passwords between users, I've been doing tons of research into encryption algorithms, CSPRNGs, hashing algorithms, key stretching etc... I just want ...
-1votes
1answer
3kviews
Current Encryption Algorithms? [closed]
What are some encryption algorithms that are currently in use by secure websites, by operating systems, or by Secure USB thumb drive manufacturers. I am trying to do research on differences in speed ...
-7votes
1answer
585views
What is the excellence of RSA vs my algorithm [closed]
I was wondering that what make RSA Asymmetric Cryptography Algorithm special. So I wrote a very simple algorithm that do the same work (Generate Public and Private Key) Now I want to ask you that What ...
2votes
2answers
3kviews
Algorithm to generate NTLMv2 Hash in PHP
I am trying to develop a PHP function to calculate NTLMv2 hash by providing server & client challenge, domain, account and password. The resulting hash appears to be not correct. Can someone ...
-3votes
1answer
14kviews
Asymmetric encryption algorithms [closed]
What are the best asymmetric encryption algorithms out there? I am trying to use RSA in my project howoever I have read that it is not quite secure as other asymmetric encryption algorithms.