Skip to main content

All Questions

1vote
1answer
59views

Exposing size of last chunk in RSA file encryption

So I'm implementing RSA encryption. I'm processing input in chunks of known constant size (depends on modulus) but the last chunk might be smaller so I save its size in plaintext at the end of output ...
Maq's user avatar
  • 113
3votes
1answer
244views

How to generate a Symmetric Key on the Secure Enclave of iOS devices and use it to encrypt data

I'm working on a secure app that uses the user's master password to derive a symmetric key to encrypt all the user information. I want to add FaceId support now, and the approach I was thinking of was ...
Enric's user avatar
1vote
1answer
125views

Is it possible to use arbitrary file(s) to encrypt another file?

i.e. To allow an unofficial software modification (which is too extensive to distribute as delta/patch files) to be distributed while ensuring the user owns the original software, it would be ...
Hiccup's user avatar
0votes
1answer
71views

End to end encryption

Can ISPs see file names and file types that are being downloaded from zero knowledge end to end encrypted cloud storage folders like mega.
Robert Bak's user avatar
0votes
2answers
233views

Should you encrypt sensitive files even with FDE?

I'm in the process of trying to make my current laptop setup more secure, especially I'm planning to finally use FDE and enable Secure Boot. However, I'm still unsure on how to handle sensitive, ...
zhekemist's user avatar
0votes
0answers
116views

NTRU - How is the master key and session key generated?

I am learning the PKC topics and would like to understand about the master and session key generation process regarding NTRU. Let's make it a scenario, if a user wants to register during the ...
Chris Lo's user avatar
1vote
1answer
1kviews

GPG can't decrypt my data because of an invalid packet

I have an encrypted data containig some of my data that I am unable to decrypt. It is archived with tar, compressed with gzip and encrypted with gnupg. Today I tried to decrypt it with gpg and it ...
Nicolas Dumitru's user avatar
0votes
0answers
128views

Why doesn't file/folder encryption work the way I imagine it should? Can I have the UX I want? Tell me what's wrong with this idea

I have been looking around at various encryption schemes, and I haven't found anything exactly like what I want in terms of user experience. If what I want isn't a thing, I assume it's been thought of,...
Stonecraft's user avatar
0votes
0answers
142views

Choosing Encryption Strategies for Secure Long-Term Storage of Sensitive Data

When considering external drives for secure long-term storage of sensitive data, what are the pros and cons of using the same password for encrypting all files versus using random passwords for each ...
S. G.'s user avatar
3votes
2answers
1kviews

TPM - ECC based encryption / decryption using the public key

Our device comes with a device certificate which was signed with our private registration authority (CA). The private key (type ECC) was generated on the device itself - to be more specific directly ...
TrinityTonic's user avatar
1vote
1answer
311views

How to protect files in use on a system powered on from physical theft or tampering?

I'm in the process of figuring out an encryption strategy for a personal Linux system. My laptop is almost always on, or in sleep mode, except for longer travels. My main threats are theft of my ...
CryptGuest's user avatar
1vote
1answer
178views

AEAD: Authenticating a digest of my data instead the data itself

Relevant question for Python: Stack Exchange: https://stackoverflow.com/questions/75739308/aead-authentication-with-huge-input-that-doesnt-fit-into-ram Top Answers: https://topanswers.xyz/python?q=...
user2373145's user avatar
0votes
1answer
269views

How does Ransomware encrypt files? [duplicate]

I have a question about how ransomware works. According to the authors of this paper: https://www.cise.ufl.edu/~traynor/papers/scaife-icdcs16.pdf (page 2 - 3) , class C is: ransomware reads the ...
Pieter Jansen's user avatar
1vote
1answer
2kviews

Android File Encryption without screen lock

I am trying to understand the FBE Key generation and verification process at every boot. My device is going to be handled without a lock screen (Android 11 with FBE + Metadata Encryption Enabled), so ...
Sneha Sharma's user avatar
0votes
2answers
591views

Ransomware public key: can I find the respective private key?

I got a ransomware called StopDjvu. On my PC, I have found the public key that is used by the malware (maybe RSA hardcoded). Is it possible to extract the private key from the public key?
ransomhate's user avatar

153050per page
close