Cryptography covers, among other things, encryption, hashing and digital signatures. Cryptography questions not directly related to software development are better asked at crypto.stackexchange.com.

learn more… | top users | synonyms (2)

0
votes
1answer
15 views

algorithm - Is the RijndaelManaged Class in C# equivalent to AES encryption?

I am asking this question to confirm whether the RijndaelManaged class in C# is equivalent to AES encryption. From what I have been reading, RijndaelManaged was the algorithm of choice to implement ...
2
votes
1answer
23 views

Algorithm for elliptic curve point compression

I'm using Javascript to generate elliptic curves for use in a cryptographic messaging app based on this example code http://www-cs-students.stanford.edu/~tjw/jsbn/ecdh.html The public keys will be ...
0
votes
0answers
9 views

Installing PFX files via code VS the GUI

I have a pfx file that is protected by a password. I generated it myself. If I install it via the Internet Manager snap-in it prompts me for the password and doesn't allow me to install it without the ...
0
votes
0answers
27 views

Cannot able to verify a signed data

Through smart card using a tool, I am signing data "Hello". The output what i am getting is in hex format. 14 5F 65 CE 7C 2D 8A 0A FA B0 FB 86 CE 28 90 84 37 2D 04 63 B2 35 FA 40 4A B6 35 C8 90 AF ...
0
votes
0answers
17 views

PassportJS and Crypto with NodeJS

I'm building a login system that uses passportJS and the NodeJS's crypto Module. I encrypt the password using crypto like so cipher.update(user.Password, 'utf8', 'base64'); user.Password = ...
0
votes
0answers
21 views

How to encrypt and decrypt data using in sending and receiving via TCP client

Im trying to develop a simple Server/client chat app, which the server is my own pc. this app supports voice chat ( and maybe video chat in future! ) and I really want my transferring data be safe and ...
4
votes
4answers
84 views

Protecting crypto keys in RAM?

is there any way to protect encryption keys that are being stored in RAM from a freezer attack? (Sticking the computer in a freezer before rebooting malicious code to access the contents of RAM) This ...
1
vote
2answers
63 views

Python and Cryptography: md5

I am very interested in python and cryptography and I would like to know what would be the most simple method in python to crack a hash. I would like to build a small python script that can crack ...
0
votes
0answers
10 views

User is logged out when loading X509Certificate2

In my Cart Controller, I force the user to login by using the [Authorize] attribute on my controller class [Authorize] public class CartController : Controller They login no problem. They traverse ...
0
votes
0answers
19 views

Store keys in windows without windows key repository

I am writing an application in windows using OpenSSL (C/C++), but I don't want to use windows certificate store. Is there some standard to store public/private/symmetric keys? I am going to use ...
0
votes
2answers
31 views

I need to collect credit card information to sell products via a website, what rules are there about this? [closed]

I am working on a website that collects credit card information. What rules are there in the United States, the states of New York and Delaware, and elsewhere regarding the transmission and/or ...
0
votes
1answer
29 views

Why isn't the key equal using OpenSSL diffie hellman?

I can't figure out why my keys aren't equal when doing this diffie hellman exchange example. I'm using the openssl library in C (openssl/dh.h). It seems pretty straightforward, but for some reason ...
0
votes
1answer
39 views

C# RSA encryption/decryption with transmission

I've seen plenty of encryption/decryption tutorials and examples on the net in C# that use the System.Security.Cryptography.RSACryptoServiceProvider, but what I'm hoping to be able to do is: Create ...
-1
votes
0answers
18 views

Javax.crypto works in simulator but not in a real device

I have developed a little app for android using 2.3.3 SDK. I used javax.crypto Librarie shipped with JRE1.7 to encrypt info saved in a small sqllite database in my app. Everithing works fine the ...
-1
votes
0answers
14 views

which one better audio steganography and image steganography [closed]

which one better audio steganography and image Steganography I m not asking there difference i m asking why should I choose image Steganography over audio Steganography or vice versa..

1 2 3 4 5 239
15 30 50 per page