Skip to main content

All Questions

2votes
2answers
448views

Is there such a cryptographic algorithm?

Is there such a cryptographic algorithm that will encrypt any file with a password. But when decrypting, if the password is incorrect, the file will be decrypted, but instead of relevant data there ...
optic1's user avatar
-5votes
2answers
165views

What is the most crypto-resistive algorithm to safely send information? [closed]

What algorithm is the best to use for storing, sending passwords, account data, and other information between desktop apps over the network. Looking for the best crypto-resistive algorithm to use in ...
Markiian Benovskyi's user avatar
-1votes
1answer
321views

Is this algorithm safe for encryption? (Cryptography Algorithm is provided)

Jasoos (Cryptography Algorithm) I am working on encrypting and decrypt web application. I have built an algorithm that uses 24 bits long key to encrypt/decrypt the message. Review this algorithm and ...
gauravd2196's user avatar
0votes
1answer
307views

What security considerations apply to a blockchain implementation for private use?

I want to know that if a company wants to implement a model of blockchain, let's say for internal transactions across its offices in different countries, what are the main and important security ...
John McKean's user avatar
5votes
1answer
755views

Is rounds in a cryptography algorithm same as iterating the algorithm?

In a cryptography algorithm such as AES or DES, does the number of rounds mean same as iterating the algorithm? Example: c= "plaintext"; for(int i=0;i<5; i++) { c = AES(c , "key"); } Where c ...
A. Sinha's user avatar
0votes
1answer
529views

Advice on using encryption and hashing

I'm going to rephrase a question I asked earlier, as I don't think anyone understood what I meant. Basically, I'm writing a web based password locker, which can handle multiple accounts; users can ...
binks's user avatar
1vote
2answers
314views

Safely share passwords between users [closed]

I'm writing a project to securely store and share passwords between users, I've been doing tons of research into encryption algorithms, CSPRNGs, hashing algorithms, key stretching etc... I just want ...
binks's user avatar
-1votes
1answer
3kviews

Current Encryption Algorithms? [closed]

What are some encryption algorithms that are currently in use by secure websites, by operating systems, or by Secure USB thumb drive manufacturers. I am trying to do research on differences in speed ...
Freiermuth's user avatar
-7votes
1answer
585views

What is the excellence of RSA vs my algorithm [closed]

I was wondering that what make RSA Asymmetric Cryptography Algorithm special. So I wrote a very simple algorithm that do the same work (Generate Public and Private Key) Now I want to ask you that What ...
Seyed Hamed Shams's user avatar
2votes
2answers
3kviews

Algorithm to generate NTLMv2 Hash in PHP

I am trying to develop a PHP function to calculate NTLMv2 hash by providing server & client challenge, domain, account and password. The resulting hash appears to be not correct. Can someone ...
asim-ishaq's user avatar
-3votes
1answer
14kviews

Asymmetric encryption algorithms [closed]

What are the best asymmetric encryption algorithms out there? I am trying to use RSA in my project howoever I have read that it is not quite secure as other asymmetric encryption algorithms.
Matthew's user avatar

close