The password-based-encryption tag has no wiki summary.
2
votes
2answers
123 views
How can mega store my login details and still be secure?
I understand how Mega's encryption works. For a quick summary of all those in the future looking for an answer on this... here is how it works:
Upon first signing up for an account you make a ...
2
votes
1answer
90 views
Hashing a password with the password?
I was wondering if hashing a password with the password would be a good way of encrypting the password. So, the user must know his/her password to get the same result as the one in the database. Also, ...
4
votes
1answer
79 views
How to generate a key using any m passwords out of total n?
My application requires an AES-256 key K for some secure operation. In order to avoid saving this key in application, I have implemented following scheme:
There ...
1
vote
1answer
222 views
Can I secure my key by XORing it with a hashed password?
I'd like to build a simple password-protected symmetric key system. The key-creation process in my system operates as follows:
The system creates a 256-bit key purely at random.
The user chooses a ...
2
votes
1answer
167 views
Is there a known vulnerability when using identical key and salt with PBKDF2?
For optimum security, a random salt should be chosen for PBKDF2.
I came across a scenario where I produce a hash of a random file that serves as the "password". Due to the nature of files, this has ...
3
votes
3answers
730 views
Simple/beginner level explanation of salt
I'm a beginner to cryptography and looking to understand in very simple terms what salt is, when I might need to use it and why I should/should not use it. Can anyone offer me a very simple and clear ...
8
votes
1answer
382 views
How can I make my cipher show the avalanche effect?
I am a beginner in cryptography. I designed an password based encryption-decryption algorithm, which uses a random salt and a password to encrypt a message. I'm using SHA-512 for hashing, matrix ...