The Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael.

learn more… | top users | synonyms

-2
votes
1answer
51 views

Different AES 256 algorithms produce different results?

I've tried 3 AES 256-bit CBC encryption programs, and I seem to be getting different results for each one with the same 32-character password, which consists of all @ signs. They are: Polaris SSL ...
4
votes
2answers
51 views

question on hashing an aes-encrypted file

I am storing multiple sensitive data on a server that I do not own. The data is encrypted using aes-256 using cbc mode. The keys are only with me, and are stored securely. I am worried about the data ...
0
votes
0answers
23 views

Using IV buffer after altered inside a RijndaelCBC Encryption/Decryption process as IV for next message [closed]

When sending a block to be decrypted or encrypted, with RijndaelCBC, we input the data to decrypt/encrypt and an IV for syncing and to prevent identical outputs for identical inputs. Inside the ...
0
votes
2answers
39 views

How is the key obtained when I login via VPN?

So, I configure my VPN (let say which uses PPTP protocol), enter the server name, username and password. Then, I visit a website. Before that, my request is encrypted using AES with some key. That ...
3
votes
4answers
259 views

Is 1Password more secure than an AES encrypted text file?

Are there extra measures taken by 1Password and KeePass, that make them more secure than an AES-256 encrypted text file? The database formats they use seem needlessly complex for my own purposes.
4
votes
2answers
327 views

Designing a cryptographic file-sharing protocol

As a learning project, I am trying to implement a secure way to share files with a friend over dropbox. (I am not looking for existing software, I am doing this in order to learn how to do this ...
2
votes
2answers
78 views

Is splitting up an AES Key a problem?

I'm wondering if it would be a problem to split up a 256 bit AES-Key into two 16-Byte blocks and distribute it, to implement some kind of a four-eyes-principle (you need to persons to decrypt a ...
4
votes
2answers
148 views

Recommended options for LUKS (cryptsetup)

I'm looking for recommended options for cryptsetup to create fully encrypted SSD (SanDisk SSD U100 128GB), which achive: Timing O_DIRECT disk reads: 1476 MB in 3.00 seconds = 491.81 MB/sec Timing ...
5
votes
1answer
92 views

When do I use NIST AES key wrapping?

Key Wrap constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) ...
-2
votes
1answer
73 views

How to encrypt by AES-Twofish-Serpent

I was wondering how to encrypt by doing a AES-Twofish-Serpent encryption. Does this mean I encrypt in AES first then after that in Twofish, and after that in Serpent (three separate encryptions). ...
0
votes
2answers
175 views

Can AES-256 encrypted data be changed?

I have a file that supposedly contains AES-256 encrypted data. The file was created using a proprietary program that claims to use AES-256. I have tested decrypting the file with an open source ...
4
votes
1answer
129 views

What's the hash for in ECDHE-RSA-AES-GCM-SHA?

Presumably the SHA is for deriving the AES key from the shared secret. Where else is the hash used? ECDH just does ECC (no hashing). RSA does not masking and padding but we haven't used the ...
0
votes
3answers
74 views

Ways to keep AES encryption key safe.? [closed]

I am using AES encryption to secure some sensitive data. For that i have to provide a certain key for encrypting and decrypting. It's not safe to keep the key somewhere on the server. So instead of ...
2
votes
1answer
48 views

Does padding an AES key hurt security (besides lowering the strength of the key)? [closed]

I've been reading about solitare and its weaknesses, and thinking about clever ways of hiding keys. It seems like you could encode an 52-bit AES key in the vertical orientation of cards in a deck (or ...
7
votes
3answers
305 views

How can I securely convert a “string” password to a key used in AES?

I'm writing some software where I have to encrypt all files that are written to a specific folder using AES. There is one password/key that is configured somewhere, that is always used. I don't want ...
4
votes
5answers
202 views

SSL/TLS - Distinction between self-signed cert and self-signed CA, and other questions?

I have a small personal website which I wish to serve securely over HTTPS. At the moment I do not wish to use a third party CA to sign my certs. I was reading this document on generating a self-signed ...
1
vote
0answers
57 views

Using Apple NSKeyedArchiver class without encryption to save score data locally

first of all I'm sorry for my bad English! I have a question about the security of NSKeyedArchiver, a subclass of NSCoder of Apple Foundation.framework ...
5
votes
2answers
75 views

Serving data from an encrypted database over an encrypted connection

There is encrypted data in the database (asymmetric FYI). It is to be viewed as decrypted on the website. The data can be sent to the client as encrypted to be decrypted on the client's computer, or ...
-1
votes
1answer
93 views

Encrypton method that would encrypt alphanumeric data to alphanumeric data [closed]

I need efficient way(possibly as strong as AES or AES itself) to enrypt (only) aplhanumeric data and get out only alphanumeric data, using some known library (i don't want and intend to implement AES ...
2
votes
3answers
251 views

Javascript Diffie-Hellman and AES protocols

I am using the BigInteger Javascript library to create a symmetric key using Diffie-Hellman protocol. I want to create 128,160 or 192-bit keys. After some research, I have found out that I should use ...
1
vote
3answers
168 views

SSL vs Encryption

I am working on creating an android mobile application which needs to connect to a server from time to time. The application makes use of sensitive data which I would not like to get into the wrong ...
2
votes
2answers
387 views

Can someone explain a little better what exactly is accomplished by generation of DH parameters?

I'm setting up a node.js server: https.createServer({ ... ciphers: 'ECDHE-RSA-AES128-SHA256:AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH', honorCipherOrder: true }, app).listen(443); ...
30
votes
1answer
1k views

Why does AES encryption take more time than decryption?

While I was studying the time consumed by some methods I found that encryption take more time than decryption. Is this right? I am using AES (the same steps will be taken during the enc and dec)
3
votes
2answers
296 views

Key size difference between AES and RSA

Can I say that 128 bit using AES provide more security than 1024 using RSA?
-1
votes
1answer
190 views

Why can't a AES256-encrypted file be decrypted on machine other than the one it was encrypted? [closed]

I encrypted a file on my mac using openssl openssl aes-256-cbc -a -salt -in one.jpg -out two.jpg now if I try to decrypt it like that: openssl aes-256-cbc -a -d -salt -in two.jpg -out one.jpg on ...
0
votes
2answers
118 views

How to implement shamir's secret sharing algorithm using AES_ENCYRPT

I am using MySQL AES_ENCRYTP() and AES_DECRYPT() to store sensitive details in a database, and currently storing the key in a php file outside of the web root with read access only. The key file looks ...
2
votes
2answers
174 views

Login system using authenticated encryption without storing user password

I'm not a security expert, so I might be asking a silly question, but let me describe what I am thinking about. First, I know that a lot of web sites store hashed/encrypted passwords which could be ...
2
votes
1answer
63 views

Is it safe to derive an IV partially from the secret data if it is hashed before use?

To help ensure uniqueness of IV's used in a CFB AES-256 cipher, software I know of gathers bits from various sources including the plaintext being enciphered, and runs that through an SHA-256 hash. ...
0
votes
1answer
96 views

Should I run my password through Bcrypt before using it for encrypting a file with AES-256? [duplicate]

I need to encrypt a file with a password that can be memorized. So I was thinking about running the password through some rounds of Bcrypt before using it for AES encryption, so every time I want to ...
2
votes
2answers
120 views

What's wrong with using AES directly/“raw”?

When developing applications that require crypto routines, I know to use libraries like keyczar and libsodium rather than "raw" crypto routines myself. However, for the specific case of using AES-CBC ...
-3
votes
1answer
120 views

Which is more secure, AES or Rijndael? [closed]

Which algorithm is generally considered to be more secure, and is AES-192/AES-256 still considered to be secure? After reading this it's lead me to belive that the Rijndael algorithm would be a more ...
2
votes
1answer
158 views

AES in CTR mode with same random IV to create same ciphertext

I am currently working on a little project. I am trying to generate an AES key with that I would like to encrypt a private RSA key. I have to do it this way. However, I do not want to save the AES ...
-2
votes
1answer
255 views

Cascading Encryption Algorithm using mcrypt or GnuGP

I'm trying to a cascading cipher encryption algorithm to encrypt a textfile via mcrypt. I'm essentially trying to emulate the behavior of TrueCrypt, where it can cascade two or three different cipher ...
0
votes
1answer
223 views

Using JTR to crack Skype Passwords

The scenario: coworker's Skype somehow lost his auto-fill password. He doesn't remember it anymore, and the account is hooked up to an email address that no longer exists. He's never purchased any ...
5
votes
2answers
311 views

Encrypting using AES 256, do I need IV? [duplicate]

I'm looking into encrypting with AES using a 256bit key, and I notice that a number of methods in various languages, for instance http://php.net/manual/en/function.openssl-encrypt.php, and I notice ...
4
votes
1answer
606 views

Different performance of openssl speed on the same hardware with AES 256 (EVP and non EVP API)

If I run openssl 1.0.1e like this : $ ./openssl speed aes-256-cbc (i.e without EVP API) Doing aes-256 cbc for 3s on 16 size blocks: 14388425 aes-256 cbc's in 3.00s Doing aes-256 cbc for 3s on 64 size ...
3
votes
1answer
201 views

Remote System Administration of an Encryption-Switch-Encrypted Infrastructure

I can't seem to find a decent explanation anywhere of the practicalities of remote system administration (e.g. SSH) of an encryption-switch-encrypted SAN-stored infrastructure. The environment will ...
1
vote
1answer
164 views

Is OpenSSL AES GCM standardized?

I have been reading about the perils of not going the pages of my own encrypt-then-mac implementation, because there so many things can go awry. So decided to use EVP_aes_256_gcm. But some questions ...
6
votes
6answers
327 views

Is leaking the hash of your encryption key a security risk?

I've been trying to design a simple archive format, that allows me to just bundle a bunch of encrypted files together. The idea, I currently have is to embed not the encryption key but a truncated ...
2
votes
4answers
926 views

RSA maximum bytes to encrypt, comparison to AES in terms of security?

What is the maximum number of bytes for encrypting a plaintext message using RSA that is reasonably secure and also efficient and would AES be better for the same size in bytes? The encryption doesn't ...
1
vote
2answers
413 views

Questions to hybrid encryption. RSA with AES

I want to use a hybrid encryption in my application, so after reading a lot of lines I ended with this implemantation, please critizie it ;) (I want to stick to .Net) byte[] aesKey = ...
-2
votes
1answer
98 views

What mode of operation is secure for block ciphers?

as RC4 is not secure and AES-CBC is same thing the only solution is using EAX mode for AES. but why mozilla NSS don't support EAX mod ? is there any secure EAX implementation ? and why wikipedia says ...
2
votes
2answers
253 views

7zip AES encrypted archive, padding oracle attack

I created an encrypted but forgot the password. When I attempted a pattern based brute force it said it had over a 100 trillion passwords to check. And to my knowledge that could take a few years. ...
0
votes
2answers
363 views

Where do I securely store application-specific symmetric key?

I am writing an application App1. This application uses SQLite database and I plan to encrypt it using AES256. For symmetric encryption I need a key, which I need to store somewhere. From a similar ...
0
votes
1answer
489 views

Can active attacks really decrypt a particular AES-256, CBC, PKCS#7 encrypted file?

I recently found out that active attacks are a threat against AES-256, CBC mode, padded with PKCS#7 (the CBC mode in particular. I should supposedly change to EAX to guard against these attacks). ...
5
votes
2answers
262 views

How less secure is an encryption if we know something about the original data?

I have a number of files encrypted with a key derived from a password. In line with standard practice, I use a random salt and password and do many PBKDF2 iterations to obtain an encryption key and ...
0
votes
1answer
943 views

How does PKCS#7 padding work with AES-256, CBC mode?

I'm a bit confused with AES-256, CBC, and how it works with padding (PKCS#7). Whenever I encrypt data of multiples of 16 bytes (the block size), extra 16 bytes are always padded at the end. For ...
3
votes
2answers
312 views

LastPass One Time Recovery Passwords--How?

The LastPass password manager stores One Time Recovery Passwords locally in each browser you use the plugin with: http://helpdesk.lastpass.com/account-recovery/ My question is, how can you have more ...
3
votes
1answer
227 views

Key length and hash function in PBKDF2

On this page: http://www.ruby-doc.org/stdlib-2.0/libdoc/openssl/rdoc/OpenSSL/PKCS5.html they make a statement that strikes me as rather weird: Key Length Specifies the length in bytes of ...
3
votes
4answers
234 views

Is it safe to have the salt equal to IV?

If I'm using AES-256 CBC to encrypt, getting the 32 byte key using multiple iterations of the PBKDF2 function with a 16 byte salt, is it safe for me to let IV be equal to the salt? (Edit: The salt is ...