Tagged Questions
3
votes
0answers
56 views
MPPE-Send and Receive key derivation from MS-CHAPv2
I am trying to get the MS-MPPE-Send-key and MS-MPPE-Recv-key from the MS-CHAPv2 challenge material. I am able to follow the RFCs 2548 3078 and 3079 to the step of getting the GetNewKeyFromSHA() it is ...
3
votes
1answer
81 views
Windows Phone and Hardcoding Values
Let us say that I have a Windows Phone application. If I hardcode a private key in the Windows Phone application, can people extract it once the application is released to the public on the Windows ...
2
votes
0answers
68 views
How do I make or get computer certificates to use with IPSEC user authentication?
I am having trouble and need some direction using computer certificates with windows 7 firewall IP Security rules, using certificates only for user authentication. I can get everything to work ...
5
votes
1answer
105 views
When taking ownership of a TPM in Windows 7, how is the SRK derived from the password?
When you take ownership of a TPM in Windows 7 you encounter a screen like this:
Based on this document, it is my understanding that completing this dialog box somehow results in the generation of ...
0
votes
2answers
175 views
Where do I securely store application-specific symmetric key?
I am writing an application App1. This application uses SQLite database and I plan to encrypt it using AES256. For symmetric encryption I need a key, which I need to store somewhere.
From a similar ...
1
vote
1answer
114 views
What is the purpose of the entropy parameter for DPAPI.Protect?
So in Windows, when you make a call to the Data Protection API, you can specify some bytes as "entropy".
To me, this sounds like salt. In PBKDF2, the salt is can, and in fact needs to be stored as ...
3
votes
1answer
140 views
DPAPI offline attack by cracking windows password?
I'm thinking of using DPAPI to protect configuration file information in my program. After doing some reading on it, it looks like it uses the user's Windows password as part of the encryption ...
2
votes
2answers
100 views
Why would encrypting data result in a call to a Domain Controller
This KB article mentions an issue where signing or encrypting information may result in a network IO call to a Domain Controller.
Apparently the RSACryptoServiceProvider's SignData and VerifyData ...
1
vote
1answer
161 views
About performance of Smart card for performing 3DES in a MD5 hash
Another question related to previous, unanswered A SW system constructed with Microsoft CNG can be FIPS 140-2 Level 2 Compliant?
Another alternative is to store the keys in a Smart card permanently ...
8
votes
2answers
3k views
Checklist on building an Offline Root & Intermediate Certificate Authority (CA)
Microsoft allows a CA to use Cryptography Next Generation (CNG) and advises of incompatibility issues for clients that do not support this suite.
Here is an image of the default cryptography settings ...
0
votes
3answers
1k views
Is diskcryptor really secure?
Diskcryptor is an open-source competitor to TrueCrypt for Windows. It has an edge over Truecrypt for system encryption, because it allows for more than one independently encrypted system partition, ...
5
votes
3answers
2k views
How do I ensure data encryption on Samba transmission on *NIX systems?
I have a heterogeneous system (both MS and *nix) that communicates with CIFS/SMB. How can I ensure proper data encryption at the application layer?
5
votes
2answers
209 views
Do any crypto libraries take advantage of Windows GPU API “Direct Compute”?
Are there any encryption (decryption?) libraries that take advantage of the Windows GPU API?
8
votes
5answers
5k views
How secure is NTFS encryption?
How secure is the data in a encrypted NTFS folder on Windows (XP, 7)?
(The encryption option under file|folder -> properties -> advanced -> encrypt.)
If the user uses a decent password, can this ...
8
votes
5answers
2k views
How can I decrypt data with Java, without hard-coding the key?
I hope this is not a chicken-egg problem or reinventing the wheel but here goes.
I have a Java application that needs to access a password protected file (actually during the application startup).
The ...