Skip to main content

Questions tagged [key]

Physical or digital keys. Digital keys are used for encryption or signing, or for authentication (e.g. API key). For product keys, use the tag product-key.

1vote
0answers
44views

GPG: How to clean/refresh the cache involved with the "pubring.kbx" file?

About GPG and for the kbxutil command in the following page: 14.1.1 Scrutinizing a keybox file Has the following part To see statistics on the keybox in question, run it using ‘kbxutil --stats ~/....
Manuel Jordan's user avatar
0votes
2answers
69views

GPG: What is the file that represents the "secret keyring" concept?

About GPG and keys Each public key is stored in the ~/.gnupg/pubring.kbx file (correct me if it is not correct) Each public key normally has a pair of secret keys stored in the ~/.gnupg/private-keys-...
Manuel Jordan's user avatar
2votes
1answer
68views

GPG: trying to understand about of public and secret keys

Introduction In SSH can be created a pair of keys as follows for example: id_rsa id_rsa.pub Where the first one is the private and the second is the public. Where both: Are located in the ~/.ssh ...
Manuel Jordan's user avatar
3votes
1answer
440views

GPG: Why the "gpg --expert --full-gen-key" command does not show all the "kind of keys"?

For Debian 12 and Ubuntu Desktop 22.04 when is executed the following command: gpg --full-gen-key gpg (GnuPG) 2.2.40; Copyright (C) 2022 g10 Code GmbH This is free software: you are free to change and ...
Manuel Jordan's user avatar
0votes
0answers
95views

GPG: Why "pubring.kbx" contains keys I removed?

With VirtualBox is installed as guest Ubuntu Desktop 22.04.5 LTS x86_64 About gpg gpg --version gpg (GnuPG) 2.2.27 libgcrypt 1.9.4 ... Home: /home/manueljordan/.gnupg To remove some keys, I executed ...
Manuel Jordan's user avatar
1vote
1answer
88views

What do I need to consider when encrypting multiple (many) files (sometimes in differerent versions with only little difference) with the same key?

I need to continuously encrypt a set of files so that I can send them to a group of people that I trust and who trust among themselves. Thus I would ideally use a symmetric encryption scheme with one ...
René Nyffenegger's user avatar
1vote
0answers
73views

where is the "DNS Format" for private keys described?

RFC6605: Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC has this example of a P-256 key: Private-key-format: v1.2 Algorithm: 13 (ECDSAP256SHA256) PrivateKey: GU6SnQ/Ou+...
neubert's user avatar
  • 1,808
0votes
2answers
148views

Is it bad practice to reuse a private key password across multiple keys?

Whether it be a private key for a TLS certificate, an SSH server, or a code signing cert, is it bad practice to use the same password across multiple? My assumption would be no, seeing as a key ...
security_paranoid's user avatar
1vote
2answers
216views

How can I compile and run Fortran/C programs on a shared remote server without exposing my code to other root users?

I have access to a big remote server via SSH and I'm a root user on that server. However, there are multiple other root users who also have access to this server. I want to run some Fortran/C programs ...
Akhil Akkapelli's user avatar
0votes
0answers
215views

BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256

I’m working on a Bluetooth Low Energy lock system and have implemented a challenge-response authentication flow for secure communication between the lock (an ESP32 device) and the user's phone. I'm ...
Sakura M.'s user avatar
0votes
1answer
117views

How can I keep git ssh keys from developers in server

I'm trying to meet a requirement where devs can log in to a server, launch, and test code without having the ability to pull (or access any ssh keys)code from the repository. I don't want to grant ...
LUser's user avatar
0votes
1answer
531views

Why chrome shows several certificates for encryption?

when i check connection status with google services (gmail for instance) i see that connection is secure. Then I can check certificate details. Chrome shows that it uses 3 different certificates with ...
Essi's user avatar
0votes
1answer
180views

Why is the boot key used to access the encrypted SAM database hashes?

A quick something I’ve been wondering: why is the boot key used to access the encrypted SAM database hashes, (and not another key,) and also what encryption mechanism is actually used to encrypt the ...
security_paranoid's user avatar
3votes
1answer
2kviews

PGP expired encryption subkey : renew or replace?

I am in the process of learning PGP (GnuPG more precisely). I am trying to figure out which is the best strategy for my encryption ([E]) subkey in terms of expiration/revocation/renewal. Could you ...
ChennyStar's user avatar
1vote
1answer
133views

Key Hash With Securely-Optimal Setting : For Encryption vs For Password

Do you have to make a key hash with securely-optimum setting (eg. 100MB memlimit, 3 opslimit) for encryption ? So I'm making a text encryption function with javascript, using XChaCha20-Poly1305 and ...
Agus Setiawan's user avatar

153050per page
close