The algorithm tag has no wiki summary.
-1
votes
1answer
44 views
Rescue Truecrypt Container w. Keyfiles [on hold]
TrueCrypt got dumped some time ago and I found a 150 GB container still holding data.
The attempt to mount it was a fail. I forgot the password. The password isn't the problem here, just around 6000 ...
0
votes
1answer
34 views
Private and public key need to have same algorithm?
The private and the public key from the cert must have the same algorithm, correct?
EDIT: Yes of course pub / priv are a key pair.
So this code would be legal, to be more flexible (e.g. ECDSA or DSA):
...
1
vote
0answers
42 views
Klein and PTW wep attack
I'm working on an implementation of Klein's wep attack.
For that, I've set up a router with wep encryption and collected 50,000 unique IVs from it.
I tried only calculating K[0], meaning - the first ...
0
votes
4answers
84 views
Password Hashing Without a Unique Salt
I have a question about password hashing. This is not a question about the the BEST POSSIBLE method of hashing passwords, but rather a more utilitarian question about what is sufficient to hash a ...
0
votes
1answer
74 views
Are there maximum allowed key size in USA?
I've heard using encryption outside military use had been illegal during a long time in USA.
However I've also heard that when the regulation was updated, limits were puts on encryption strength such ...
-3
votes
1answer
75 views
Is there a way to attack the SHA-3, GOST, and WHIRLPOOL hash functions? [closed]
Is there a way to attack SHA-3, GOST, and WHIRLPOOL hash functions?
-1
votes
1answer
84 views
Current Encryption Algorithms? [closed]
What are some encryption algorithms that are currently in use by secure websites, by operating systems, or by Secure USB thumb drive manufacturers. I am trying to do research on differences in speed ...
-5
votes
1answer
129 views
What is the excellence of RSA vs my algorithm [closed]
I was wondering that what make RSA Asymmetric Cryptography Algorithm special.
So I wrote a very simple algorithm that do the same work (Generate Public and Private Key)
Now I want to ask you that What ...
0
votes
3answers
139 views
Hash algorithm without ASIC's
I want to design a new crypto-currency, with an algorithm which is different from SHA-256 or Scrypt.
But in order to do this, I need to know the hash algorithm which is the hardest to make ...
1
vote
1answer
97 views
Which part is the longest when gerating RSA key pairs?
Whether I use openssll or gnutls's certtool, I end in a single threaded part which take several minutes.
When I try to compile the libraries with auto-parallelizer advanced efficient tools. It sill ...
2
votes
4answers
350 views
For someone who has a key and ciphertext, is it possible to find out what encryption algorithm was used?
I am new in cryptography, and while learning a different questions pop up in my mind. Here is one of them.
For someone who has a key and ciphertext, is it possible to find out what encryption ...
0
votes
1answer
153 views
Password algorithm to be integrated on a website
I have recently started a project to code a secure password protection algorithm to be used on both computers and mobile devices. As I have never done anything like it before, I am a bit unsure of ...
1
vote
1answer
96 views
Using secp256k1 and ECDSA with IKE
I just tried using an IKE daemon and EC certificates. I used the secp256k1 curve for key generation. The daemon claims
signature scheme ECDSA-256 not supported by private key
Now I am wondering ...
0
votes
1answer
167 views
Luhn algorithm applied to file access
I am in the following setup: given department ids, employee ids and file ids I want to check whether employee xy of department AB is allowed to access file f.
E.g. department id = "012", employee id ...
0
votes
2answers
372 views
Algorithm to generate NTLMv2 Hash in PHP
I am trying to develop a PHP function to calculate NTLMv2 hash by providing server & client challenge, domain, account and password. The resulting hash appears to be not correct. Can someone ...
-1
votes
1answer
97 views
Permutation in Block Ciphers
I was reading some e-books to understand the basics of block ciphers and how it works in AES. As i understood, Permutation plays a big part in AES and Block Ciphers,
Here is what i understood by ...
4
votes
1answer
166 views
What are covert channel algorithms?
Covert channels are normally used for communicating illegally or for some hidden communications, but I am trying to figure out what covert channel algorithms might be.
Has anyone heard of this term ...
3
votes
1answer
143 views
Multiple encrypted messages known to have matching (unknown) content
A recent discussion regarding ways to keep data secure through multiple iterations of a program's execution (with repeated read/write operations) raised a question regarding known-plaintext attacks ...
-6
votes
1answer
4k views
Asymmetric encryption algorithms [closed]
What are the best asymmetric encryption algorithms out there? I am trying to use RSA in my project howoever I have read that it is not quite secure as other asymmetric encryption algorithms.
5
votes
2answers
865 views
Does chaos theory have any practical application in computer security?
Having learned about chaos theory at university some years ago, I've been curious ever since to know whether it has found any practical use in computing.
Let me explain where I imagine it could be ...
0
votes
1answer
355 views
Determine hashing algorthim only with known input and output
Given the input:
test
A system generates the following output hash:
0x001F41B6A0534D3B851D69EFE6237F550100000010D5F4FC65E64BCFDBF2590212E4411C44942C6C734C00ACFE13B958DCAB3614
I do not know ...
3
votes
2answers
3k views
Salted hashes vs HMAC?
Most of discussions involving access credentials include references to "hashing salted passwords". Is this another way to referring to the HMAC algorithm or a totally different operation? Different or ...
4
votes
4answers
389 views
Is it a good idea to have a “master” password?
Though I do have a good memory of passwords, it is quite impossible to have one password per application. Yet, it should be... My current way to deal with passwords is to have five passwords and to ...
3
votes
6answers
408 views
Methods for remembering passwords around the web
What's the least painful way to manage passwords for user accounts that you have on various sites?
I see only 3 options:
Password manager. Passwords can be different and strong, but the downside is ...
245
votes
10answers
28k views
Is my developer's home-brew password security right or wrong, and why?
A developer, let's call him 'Dave', insists on using home-brew scripts for password security. See Dave's proposal below.
His team spent months adopting an industry standard protocol using Bcrypt. ...
3
votes
5answers
1k views
Is there an asymmetric encryption algorithm that maintains the length of the plaintext?
I want to protect some registers by encrypting them without providing additional memory space. Is there a encryption algorithm that will maintain the length of the data to be encrypted? (i.e. ...
7
votes
5answers
461 views
How to prevent pay per show/click abuse?
We have a webapp. 3rd party websites put our banners on their pages (banner is a snippet of HTML). They are paid for it using "Pay per click" or "Pay per show" methods.
So 3rd party website's owners ...
4
votes
1answer
231 views
How will security need to be changed if we can crack password hashes in quasi-polynomial time?
If we suppose that we have access to some form of generalized password hacking/cracking that can somehow find an $n$-bit password in time $O(n^{\log n})$, is there need for alarm?
This question ...
7
votes
1answer
891 views
Identifying an unknown hash
During some of my research work I encountered an unknown hashed string. What I am curious about is the algorithm used to generate it. A factor that makes it interesting - the string contains an ...
3
votes
2answers
731 views
How realistic and possible is this sort of attack
I scanned a host with Nessus, in order to do a vulnerability Assessment, and one of the findings looked really odd to me.
Nessus rated this finding's risk as Medium. The finding was, that a service ...
8
votes
4answers
517 views
How can we factor Moore's law into password cracking estimates?
How would we go about factoring Moore's law into exceedingly long password cracking estimates?
Let's say we've got a 12 character password containing mixed-case alpha characters and numbers, i.e. ...