3
votes
0answers
56 views

MPPE-Send and Receive key derivation from MS-CHAPv2

I am trying to get the MS-MPPE-Send-key and MS-MPPE-Recv-key from the MS-CHAPv2 challenge material. I am able to follow the RFCs 2548 3078 and 3079 to the step of getting the GetNewKeyFromSHA() it is ...
3
votes
1answer
81 views

Windows Phone and Hardcoding Values

Let us say that I have a Windows Phone application. If I hardcode a private key in the Windows Phone application, can people extract it once the application is released to the public on the Windows ...
2
votes
0answers
68 views

How do I make or get computer certificates to use with IPSEC user authentication?

I am having trouble and need some direction using computer certificates with windows 7 firewall IP Security rules, using certificates only for user authentication. I can get everything to work ...
5
votes
1answer
105 views

When taking ownership of a TPM in Windows 7, how is the SRK derived from the password?

When you take ownership of a TPM in Windows 7 you encounter a screen like this: Based on this document, it is my understanding that completing this dialog box somehow results in the generation of ...
0
votes
2answers
175 views

Where do I securely store application-specific symmetric key?

I am writing an application App1. This application uses SQLite database and I plan to encrypt it using AES256. For symmetric encryption I need a key, which I need to store somewhere. From a similar ...
1
vote
1answer
114 views

What is the purpose of the entropy parameter for DPAPI.Protect?

So in Windows, when you make a call to the Data Protection API, you can specify some bytes as "entropy". To me, this sounds like salt. In PBKDF2, the salt is can, and in fact needs to be stored as ...
3
votes
1answer
140 views

DPAPI offline attack by cracking windows password?

I'm thinking of using DPAPI to protect configuration file information in my program. After doing some reading on it, it looks like it uses the user's Windows password as part of the encryption ...
2
votes
2answers
100 views

Why would encrypting data result in a call to a Domain Controller

This KB article mentions an issue where signing or encrypting information may result in a network IO call to a Domain Controller. Apparently the RSACryptoServiceProvider's SignData and VerifyData ...
1
vote
1answer
161 views

About performance of Smart card for performing 3DES in a MD5 hash

Another question related to previous, unanswered A SW system constructed with Microsoft CNG can be FIPS 140-2 Level 2 Compliant? Another alternative is to store the keys in a Smart card permanently ...
8
votes
2answers
3k views

Checklist on building an Offline Root & Intermediate Certificate Authority (CA)

Microsoft allows a CA to use Cryptography Next Generation (CNG) and advises of incompatibility issues for clients that do not support this suite. Here is an image of the default cryptography settings ...
0
votes
3answers
1k views

Is diskcryptor really secure?

Diskcryptor is an open-source competitor to TrueCrypt for Windows. It has an edge over Truecrypt for system encryption, because it allows for more than one independently encrypted system partition, ...
5
votes
3answers
2k views

How do I ensure data encryption on Samba transmission on *NIX systems?

I have a heterogeneous system (both MS and *nix) that communicates with CIFS/SMB. How can I ensure proper data encryption at the application layer?
5
votes
2answers
209 views

Do any crypto libraries take advantage of Windows GPU API “Direct Compute”?

Are there any encryption (decryption?) libraries that take advantage of the Windows GPU API?
8
votes
5answers
5k views

How secure is NTFS encryption?

How secure is the data in a encrypted NTFS folder on Windows (XP, 7)? (The encryption option under file|folder -> properties -> advanced -> encrypt.) If the user uses a decent password, can this ...
8
votes
5answers
2k views

How can I decrypt data with Java, without hard-coding the key?

I hope this is not a chicken-egg problem or reinventing the wheel but here goes. I have a Java application that needs to access a password protected file (actually during the application startup). The ...

1 2
15 30 50 per page