Questions tagged [key]
Physical or digital keys. Digital keys are used for encryption or signing, or for authentication (e.g. API key). For product keys, use the tag product-key.
223 questions
1vote
0answers
44views
GPG: How to clean/refresh the cache involved with the "pubring.kbx" file?
About GPG and for the kbxutil command in the following page: 14.1.1 Scrutinizing a keybox file Has the following part To see statistics on the keybox in question, run it using ‘kbxutil --stats ~/....
0votes
2answers
69views
GPG: What is the file that represents the "secret keyring" concept?
About GPG and keys Each public key is stored in the ~/.gnupg/pubring.kbx file (correct me if it is not correct) Each public key normally has a pair of secret keys stored in the ~/.gnupg/private-keys-...
2votes
1answer
68views
GPG: trying to understand about of public and secret keys
Introduction In SSH can be created a pair of keys as follows for example: id_rsa id_rsa.pub Where the first one is the private and the second is the public. Where both: Are located in the ~/.ssh ...
3votes
1answer
440views
GPG: Why the "gpg --expert --full-gen-key" command does not show all the "kind of keys"?
For Debian 12 and Ubuntu Desktop 22.04 when is executed the following command: gpg --full-gen-key gpg (GnuPG) 2.2.40; Copyright (C) 2022 g10 Code GmbH This is free software: you are free to change and ...
0votes
0answers
95views
GPG: Why "pubring.kbx" contains keys I removed?
With VirtualBox is installed as guest Ubuntu Desktop 22.04.5 LTS x86_64 About gpg gpg --version gpg (GnuPG) 2.2.27 libgcrypt 1.9.4 ... Home: /home/manueljordan/.gnupg To remove some keys, I executed ...
1vote
1answer
88views
What do I need to consider when encrypting multiple (many) files (sometimes in differerent versions with only little difference) with the same key?
I need to continuously encrypt a set of files so that I can send them to a group of people that I trust and who trust among themselves. Thus I would ideally use a symmetric encryption scheme with one ...
1vote
0answers
73views
where is the "DNS Format" for private keys described?
RFC6605: Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC has this example of a P-256 key: Private-key-format: v1.2 Algorithm: 13 (ECDSAP256SHA256) PrivateKey: GU6SnQ/Ou+...
0votes
2answers
148views
Is it bad practice to reuse a private key password across multiple keys?
Whether it be a private key for a TLS certificate, an SSH server, or a code signing cert, is it bad practice to use the same password across multiple? My assumption would be no, seeing as a key ...
1vote
2answers
216views
How can I compile and run Fortran/C programs on a shared remote server without exposing my code to other root users?
I have access to a big remote server via SSH and I'm a root user on that server. However, there are multiple other root users who also have access to this server. I want to run some Fortran/C programs ...
0votes
0answers
215views
BLE Challenge-Response Authentication Using Pre-Shared Key and SHA-256
I’m working on a Bluetooth Low Energy lock system and have implemented a challenge-response authentication flow for secure communication between the lock (an ESP32 device) and the user's phone. I'm ...
0votes
1answer
117views
How can I keep git ssh keys from developers in server
I'm trying to meet a requirement where devs can log in to a server, launch, and test code without having the ability to pull (or access any ssh keys)code from the repository. I don't want to grant ...
0votes
1answer
531views
Why chrome shows several certificates for encryption?
when i check connection status with google services (gmail for instance) i see that connection is secure. Then I can check certificate details. Chrome shows that it uses 3 different certificates with ...
0votes
1answer
180views
Why is the boot key used to access the encrypted SAM database hashes?
A quick something I’ve been wondering: why is the boot key used to access the encrypted SAM database hashes, (and not another key,) and also what encryption mechanism is actually used to encrypt the ...
3votes
1answer
2kviews
PGP expired encryption subkey : renew or replace?
I am in the process of learning PGP (GnuPG more precisely). I am trying to figure out which is the best strategy for my encryption ([E]) subkey in terms of expiration/revocation/renewal. Could you ...
1vote
1answer
133views
Key Hash With Securely-Optimal Setting : For Encryption vs For Password
Do you have to make a key hash with securely-optimum setting (eg. 100MB memlimit, 3 opslimit) for encryption ? So I'm making a text encryption function with javascript, using XChaCha20-Poly1305 and ...