Cryptography covers, among other things, encryption, hashing and digital signatures. Cryptography questions not directly related to software development are better asked at crypto.stackexchange.com.
1
vote
2answers
25 views
A shorter non-repeating alphanumeric code than UUID in MySQL
Is it possible for MySQL database to generate a 5 or 6 digit code comprised of only numbers and letters when I insert a record? If so how?
Just like goo.gl, bit.ly and jsfiddle do it. For exaple:
...
0
votes
0answers
17 views
Cloud Computing and Elliptic curve cryptography
I am trying to model a secured cloud application using ECC. I want to know how to chose fields , curve selection that is best for my application and the type of group to use. I wish to use the binary ...
0
votes
1answer
12 views
Serialization Cryptography Error
I am having trouble using encryption with serialization when deserializing an object.
This is the error:
Failed to deserialize. Reason: End of Stream encountered before parsing was completed
...
0
votes
1answer
11 views
need to develop utility independent of technology used for website development
I need a utility to be given to my customer having site name A.com where he can decry-pt messages passed from my own site (i.e. B.com), which is build in Java technology.
Utility should be ...
0
votes
0answers
11 views
How to find maximum private key in Elliptic Curve Cryptography (ECC)?
In elliptic curve cryptography (ECC) we decide our private key. We think generator is G, in some value multiply with G gives the infinity. So our private key must be below that value. Is there any ...
0
votes
1answer
18 views
How do I decrypt an AES key using C# Bouncy Castle that was encrypted using Libgcrypt raw flag
Summary:
I am attempting to decrypt (and eventually encrypt and return) files that are AES128 encrypted. The AES key is encrypted using libcrypt's RSA provider. When I attempt to decrypt the AESKey on ...
-1
votes
0answers
20 views
How to decrypt through JavaScript of encrypted string using algorithm RSA/ECB/PKCS1Padding
I have encrypted string using algorithm RSA/ECB/PKCS1Padding through java code now the same need to be decrypted using javascript. There are some information regarding RSA on net but still not able to ...
0
votes
1answer
98 views
CRYPT_MODE_CBC not working
DelphiXe4. Encryption-decryption function file with WinCryptoApi. Encryption mode CBC. It seems to be working. Encrypts and decrypts.
// get winapi functions - ...
-3
votes
0answers
25 views
Smartcard Static Data Authentcation using Certification Authority Public Keys [on hold]
I am part of a team developing a mobile payment solution for Electricity consumers using Point of Sale Terminals. I am working on the smartcard application to be used on these terminals.
I have been ...
0
votes
1answer
26 views
Generating public/private key pair with limitations on the form of valid keys
I need a way to create public/private key pairs with a special pattern for valid pairs, like for example all valid pairs must start with 3, only much more sophisticated than this example. I'm doing ...
0
votes
1answer
17 views
How to dump DSA_SIG or RSA_SIG
I am using openssl/DSA to generate signature for some data using private key.
and on the other side I am verify data integrity using public key.
In the sample code I am able to do it successfully ...
-1
votes
0answers
15 views
regarding itunes connect cryptography [on hold]
my app is quite similar to the 1password, first it will ask user to enter a correct password, also when saving the data (plist) I'll use the hashed password to encrypt the nsdata (otherwise login ...
0
votes
2answers
27 views
One Time Pad with DH and Cryptographic Hash Function?
I know: Never do your own crypto.
But this question is just theoretical.
Assume you do a Diffie-Hellmann Key Exchange with a server to produce a shared secret x.
Then use a cryptographic hash ...
-1
votes
0answers
8 views
Difference between actual attacks and theoretical attacks on SHA cryptographic series [on hold]
Could anyone tell me what the difference is between a THEORETICAL ATTACK (Like the one done on SHA-1) and an actual attack (Like the one done on SHA-0). Is a theoretical attack a proposed method of ...
0
votes
4answers
80 views
DES encryption/decryption
I'm using a DES algorithm I found on the web. It works fine but I have a problem.
As you know, DES encrypts/decrypts blocks of 64 bytes each. But what happens if in a big file the last block doesn't ...