Questions tagged [encryption]
Encryption is the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.
5,967 questions
1vote
1answer
92views
Is it safe to publish encrypted secrets in a git repository?
Tools like Ansible Vault, CNCF SOPS or Chezmoi make it easiy to keep secrets encrypted in version control, so that you can publish the repository, but still use the secrets inside when deploying. This ...
1vote
0answers
46views
What are the acceptable ranges of MSE, MAE, and PSNR values in the context of image encryption? [migrated]
In my research on image encryption, I use the metrics below to evaluate the level of distortion between the original image ( I ) and its encrypted version ( I' ): MSE (Mean Squared Error) MAE (Mean ...
1vote
1answer
59views
Exposing size of last chunk in RSA file encryption
So I'm implementing RSA encryption. I'm processing input in chunks of known constant size (depends on modulus) but the last chunk might be smaller so I save its size in plaintext at the end of output ...
2votes
0answers
74views
Is a write-cache in my Synology NAS exposing unencrypted data?
I have encrypted mounts in my Synology DS 918+ and I'm using an additional SSD leftover as a write-cache. When I have an encrypted directory mounted, are there unencrypted bits stored on the SSD? Do ...
0votes
1answer
92views
Why use the data protection classes of iOS
According to https://support.apple.com/en-ca/guide/security/secb010e978a/web: If a file isn’t assigned a Data Protection class, it is still stored in encrypted form (as is all data on an iPhone, iPad,...
0votes
1answer
44views
Hashed passwords question and encryption [duplicate]
Apologies if this is a basic question. I understand that when I log into a website, I send my password in an encrypted form. This gets unencrypted by the server and my password is hashed and compared ...
0votes
1answer
36views
Do I need session keys/rotation with libsodium's crypto_secretbox_easy?
I have a system of several nodes communicating using crypto_secretbox_easy from libsodium (https://libsodium.gitbook.io/doc/secret-key_cryptography/secretbox), which apparently uses XSalsa20 ...
2votes
0answers
48views
How to Anonymize Entry Nodes in an Encrypted Traffic System Using Threshold Cryptography?
I'm designing an encrypted traffic system where users can stay anonymous while learning more about networking and security. Anonymity is achieved through layered encryption, where traffic passes ...
1vote
1answer
133views
AES-256 Encrypted Text Differs [closed]
I am learning about how AES encryption works. I understand the overall process, but I think I've missed something. Let's say I have this text to encrypt: "vulkanski izbruh" – 16 characters (...
0votes
1answer
66views
Is encrypting REST exposed database identifiers a bad idea?
At the end of Insecure_Direct_Object_Reference_Prevention_Cheat_Sheet it says Avoid encrypting identifiers as it can be challenging to do so securely. On login I store a cryptographically generated ...
1vote
0answers
52views
What are some reliable and well-maintained Post-Quantum Cryptography (PQC) libraries with Go support? [closed]
I am looking for reputable libraries or solution providers that offer reliable, well-maintained, and well-documented implementations of post-quantum cryptographic (PQC) algorithms. Specifically, I am ...
8votes
2answers
4kviews
Is password-based encryption better than traditional password hashing?
I have a theoretical question regarding the comparison of password-based encryption and password hashing. Not sure if Stackoverflow or crypto is the best place, but this is more on the side of ...
2votes
1answer
112views
Does revealing semantic similarity scores between AES-encrypted data create an exploitable side channel?
Background: My expertise is in machine learning/AI, not cryptography, so I apologize if I'm missing fundamental security concepts. I'm trying to build a privacy-preserving AI agent system and want to ...
2votes
1answer
98views
How does memory encryption keep the decryption key secure from memory without a seperate HSM?
For example the Go package memguard. Couldn't a devoted attacker just find the encryption key in memory? Is it that some forms of attacks can't expose all of memory but only adjacent memory/memory in ...
2votes
0answers
21views
Openssl salt option useless for file encryption? [duplicate]
Is the -salt option useful when you are doing file encryption? From what I understand, the salt protects from rainbow table attack, but such tables are used against passwords, which are usually 10-20-...