The algorithm tag has no wiki summary.
-2
votes
1answer
105 views
What type of hash is that [closed]
Hey do you guys know the algorithm used to generate this hash?
6874747a3b202063733437373676342f766c2f6e6520753933313538343931206175646960732039353861383a3a36663836392f6e7a3325313638
It's ...
1
vote
2answers
57 views
How to Conceal/Detect PGP Symmetric Algorithm Used
When Symmetrically encrypting a file, (not signing, not an asymmetric encryption question), is it possible to conceal the encryption algorithm used, or is it already concealed, but just showing on ...
18
votes
4answers
2k views
Should I use own constants when using well known hashing algorithms?
I understand that it is important to use well known and well tested hashing algorithms instead of designing my own. For such there often are reference implementations available, which initialize the ...
1
vote
0answers
40 views
Traffic anonymization through routing - software and algorithms
I stumbled upon an interview with "the grugq" in which he is talking about how hackers anonymize their traffic, i.e. hide their original ip address (- this is also what I will mean by "anonymizing" in ...
0
votes
1answer
112 views
Advice on using encryption and hashing
I'm going to rephrase a question I asked earlier, as I don't think anyone understood what I meant.
Bascially I'm writting a web based password locker, which can have multiple accounts; so that users ...
0
votes
1answer
64 views
Using encryption and hashing
I'm writing a project to securely store and share passwords between users, I've been doing tons of research into encryption algorithms, CSPRNGs, hashing algorithms, key stretching etc...
I just want ...
0
votes
1answer
46 views
Private and public key need to have same algorithm?
The private and the public key from the cert must have the same algorithm, correct?
EDIT: Yes of course pub / priv are a key pair.
So this code would be legal, to be more flexible (e.g. ECDSA or DSA):
...
1
vote
1answer
96 views
Klein and PTW wep attack
I'm working on an implementation of Klein's wep attack.
For that, I've set up a router with wep encryption and collected 50,000 unique IVs from it.
I tried only calculating K[0], meaning - the first ...
0
votes
4answers
119 views
Password Hashing Without a Unique Salt
I have a question about password hashing. This is not a question about the the BEST POSSIBLE method of hashing passwords, but rather a more utilitarian question about what is sufficient to hash a ...
0
votes
1answer
116 views
Are there maximum allowed key size in USA?
I've heard using encryption outside military use had been illegal during a long time in USA.
However I've also heard that when the regulation was updated, limits were puts on encryption strength such ...
-3
votes
1answer
92 views
Is there a way to attack the SHA-3, GOST, and WHIRLPOOL hash functions? [closed]
Is there a way to attack SHA-3, GOST, and WHIRLPOOL hash functions?
-1
votes
1answer
143 views
Current Encryption Algorithms? [closed]
What are some encryption algorithms that are currently in use by secure websites, by operating systems, or by Secure USB thumb drive manufacturers. I am trying to do research on differences in speed ...
-5
votes
1answer
143 views
What is the excellence of RSA vs my algorithm [closed]
I was wondering that what make RSA Asymmetric Cryptography Algorithm special.
So I wrote a very simple algorithm that do the same work (Generate Public and Private Key)
Now I want to ask you that What ...
0
votes
3answers
166 views
Hash algorithm without ASIC's
I want to design a new crypto-currency, with an algorithm which is different from SHA-256 or Scrypt.
But in order to do this, I need to know the hash algorithm which is the hardest to make ...
1
vote
1answer
104 views
Which part is the longest when gerating RSA key pairs?
Whether I use openssll or gnutls's certtool, I end in a single threaded part which take several minutes.
When I try to compile the libraries with auto-parallelizer advanced efficient tools. It sill ...
2
votes
4answers
384 views
For someone who has a key and ciphertext, is it possible to find out what encryption algorithm was used?
I am new in cryptography, and while learning a different questions pop up in my mind. Here is one of them.
For someone who has a key and ciphertext, is it possible to find out what encryption ...
0
votes
1answer
185 views
Password algorithm to be integrated on a website
I have recently started a project to code a secure password protection algorithm to be used on both computers and mobile devices. As I have never done anything like it before, I am a bit unsure of ...
1
vote
1answer
106 views
Using secp256k1 and ECDSA with IKE
I just tried using an IKE daemon and EC certificates. I used the secp256k1 curve for key generation. The daemon claims
signature scheme ECDSA-256 not supported by private key
Now I am wondering ...
0
votes
1answer
181 views
Luhn algorithm applied to file access
I am in the following setup: given department ids, employee ids and file ids I want to check whether employee xy of department AB is allowed to access file f.
E.g. department id = "012", employee id ...
0
votes
2answers
485 views
Algorithm to generate NTLMv2 Hash in PHP
I am trying to develop a PHP function to calculate NTLMv2 hash by providing server & client challenge, domain, account and password. The resulting hash appears to be not correct. Can someone ...
-1
votes
1answer
108 views
Permutation in Block Ciphers
I was reading some e-books to understand the basics of block ciphers and how it works in AES. As i understood, Permutation plays a big part in AES and Block Ciphers,
Here is what i understood by ...
4
votes
1answer
173 views
What are covert channel algorithms?
Covert channels are normally used for communicating illegally or for some hidden communications, but I am trying to figure out what covert channel algorithms might be.
Has anyone heard of this term ...
3
votes
1answer
158 views
Multiple encrypted messages known to have matching (unknown) content
A recent discussion regarding ways to keep data secure through multiple iterations of a program's execution (with repeated read/write operations) raised a question regarding known-plaintext attacks ...
-6
votes
1answer
4k views
Asymmetric encryption algorithms [closed]
What are the best asymmetric encryption algorithms out there? I am trying to use RSA in my project howoever I have read that it is not quite secure as other asymmetric encryption algorithms.
5
votes
2answers
968 views
Does chaos theory have any practical application in computer security?
Having learned about chaos theory at university some years ago, I've been curious ever since to know whether it has found any practical use in computing.
Let me explain where I imagine it could be ...
0
votes
1answer
413 views
Determine hashing algorthim only with known input and output
Given the input:
test
A system generates the following output hash:
0x001F41B6A0534D3B851D69EFE6237F550100000010D5F4FC65E64BCFDBF2590212E4411C44942C6C734C00ACFE13B958DCAB3614
I do not know ...
4
votes
2answers
3k views
Salted hashes vs HMAC?
Most of discussions involving access credentials include references to "hashing salted passwords". Is this another way to referring to the HMAC algorithm or a totally different operation? Different or ...
5
votes
4answers
422 views
Is it a good idea to have a “master” password?
Though I do have a good memory of passwords, it is quite impossible to have one password per application. Yet, it should be... My current way to deal with passwords is to have five passwords and to ...
3
votes
6answers
431 views
Methods for remembering passwords around the web
What's the least painful way to manage passwords for user accounts that you have on various sites?
I see only 3 options:
Password manager. Passwords can be different and strong, but the downside is ...
252
votes
10answers
29k views
Is my developer's home-brew password security right or wrong, and why?
A developer, let's call him 'Dave', insists on using home-brew scripts for password security. See Dave's proposal below.
His team spent months adopting an industry standard protocol using Bcrypt. ...
3
votes
5answers
1k views
Is there an asymmetric encryption algorithm that maintains the length of the plaintext?
I want to protect some registers by encrypting them without providing additional memory space. Is there a encryption algorithm that will maintain the length of the data to be encrypted? (i.e. ...
7
votes
5answers
481 views
How to prevent pay per show/click abuse?
We have a webapp. 3rd party websites put our banners on their pages (banner is a snippet of HTML). They are paid for it using "Pay per click" or "Pay per show" methods.
So 3rd party website's owners ...
4
votes
1answer
238 views
How will security need to be changed if we can crack password hashes in quasi-polynomial time?
If we suppose that we have access to some form of generalized password hacking/cracking that can somehow find an $n$-bit password in time $O(n^{\log n})$, is there need for alarm?
This question ...
7
votes
1answer
1k views
Identifying an unknown hash
During some of my research work I encountered an unknown hashed string. What I am curious about is the algorithm used to generate it. A factor that makes it interesting - the string contains an ...
3
votes
2answers
894 views
How realistic and possible is this sort of attack
I scanned a host with Nessus, in order to do a vulnerability Assessment, and one of the findings looked really odd to me.
Nessus rated this finding's risk as Medium. The finding was, that a service ...
8
votes
4answers
545 views
How can we factor Moore's law into password cracking estimates?
How would we go about factoring Moore's law into exceedingly long password cracking estimates?
Let's say we've got a 12 character password containing mixed-case alpha characters and numbers, i.e. ...