Skip to main content

All Questions

Tagged with
2votes
1answer
472views

What encryption algorithm is putty using?

I have setup an AlmaLinux9 server with SSHD. I have also generated a priv+pub key on my workstation, and when I check the algorithm used by my key it shows: ssh-keygen -l -f myprivatekey.pem 2048 ...
TSG's user avatar
  • 189
0votes
1answer
154views

Non-identified algorithm for RSA decryption in tpm-emulator

While analyzing the source code of tpm-emulator I found that the RSA key decryption uses an algorithm that is unknown to me. The original file with this mystery is located in rsa.c, where the ...
Victor Signaevskyi's user avatar
-3votes
1answer
162views

which algorithm/hash can possibly encrypt and decrypt certain data regardless of size?

I have intercepted some data for which i don't know which algorithm has been used to encrypt this data, this data has been for sure encrypted before transmitting, to decrypt the data i should ...
OScam's user avatar
1vote
1answer
342views

Private and public key need to have same algorithm?

The private and the public key from the cert must have the same algorithm, correct? Yes of course pub / priv are a key pair. So this code would be legal, to be more flexible (e.g. ECDSA or DSA): ...
Rufus_12's user avatar
-7votes
1answer
585views

What is the excellence of RSA vs my algorithm [closed]

I was wondering that what make RSA Asymmetric Cryptography Algorithm special. So I wrote a very simple algorithm that do the same work (Generate Public and Private Key) Now I want to ask you that What ...
Seyed Hamed Shams's user avatar
2votes
2answers
523views

Which part is the longest when gerating RSA key pairs?

Whether I use openssll or gnutls's certtool, I end in a single threaded part which take several minutes. When I try to compile the libraries with auto-parallelizer advanced efficient tools. It sill ...
user2284570's user avatar

close