Skip to main content
We’ve updated our Terms of Service. A new AI Addendum clarifies how Stack Overflow utilizes AI interactions.

Questions tagged [cryptography]

Filter by
Sorted by
Tagged with
0 votes
1 answer
192 views

I am writing an API for a payment system. Third parties can register callback URLs that are linked to an account ID so that whenever a transaction involving that account ID is updated, my API calls ...
Adrian Albert Koch's user avatar
1 vote
2 answers
415 views

We're building an application that needs to log into a website using built-in credentials. It's not optimal to say the least, but we're stuck with "knowing" the username and password ...
glades's user avatar
  • 493
0 votes
2 answers
204 views

I am familiar with and see the benefits of Subresource Integrity (SRI). I understand that with SRI, once you've added a script reference with the correct integrity attribute, if the remote script is ...
Rounin's user avatar
  • 295
4 votes
3 answers
283 views

Regarding cryptography and the issue of collisions, I posed a question as to whether it was ever possible to store every single possible combination of a bit array of a particular size, in a bit array ...
Anon's user avatar
  • 3,649
2 votes
2 answers
326 views

Background Tertiary to this question, I have been building my own imageboard that prevents [for example] duplicate images from being downloaded again and again on behalf of the client. How I do this, ...
Anon's user avatar
  • 3,649
2 votes
1 answer
161 views

I have a set of UUIDs that I want to assign to a set of people. I want to deliver these UUIDs to people in a secure manner, such that everyone knows that I do not know which UUID corresponds to which ...
Ian Knight's user avatar
-1 votes
1 answer
98 views

Now that Tesla has bought a large amount of BitCoin, other companies may follow suit. If my company wanted to do that, I was thinking about how it could be done. I'm familiar with the way private ...
NealWalters's user avatar
0 votes
1 answer
409 views

I am currently building a small application which used a public API to get some information. The API doesn't support auto-login in any way (don't know if something like this even exists with APIs), ...
29thDay's user avatar
-2 votes
1 answer
168 views

I was wondering if there was a way to encode binary data, such as Crypto addresses into a natural language format, in a similar fashion to how what3words.com can encode locations into three easy-to-...
Sagar Patil's user avatar
5 votes
2 answers
5k views

I am planning to implement a cryptographic library for several languages and looking for best practices. I have looked at several threads, especially this, this, and this one, which answer my ...
mushishi's user avatar
1 vote
2 answers
513 views

I'm just reviewing some of my code and thought I'd throw this out there for comment. I have a factory class that builds and returns a class for RSA Crypto tasks. It implements IDisposable. All the ...
Jammer's user avatar
  • 184
1 vote
1 answer
672 views

I am starting to look into how to implement SHA256 in JavaScript, and found this for example. It requires UTF-8 encoding it sounds like. Another one I saw required/supported only ASCII encoding and ...
Lance Pollard's user avatar
2 votes
1 answer
162 views

I am looking at all the green and red boxes here, and am wondering what it would look like if one were to "implement TLS" today? What should you implement if you were to implement TLS today? Do you ...
Lance Pollard's user avatar
1 vote
1 answer
188 views

Despite various ways to scrub sensitive data in volatile memory (see Survive DSE or Zeroing buffers), programs tend to perform transparent memory copies (such as a Garbage Collection). The newly ...
weir007's user avatar
  • 37
1 vote
1 answer
295 views

A PHP based webshop running on a shared hosting stores libsodium encrypted personal data in it's MySQL database. To let users have access to their own data, a design very similar to the one discussed ...
goToAndPlay's user avatar
-1 votes
1 answer
363 views

The title maybe it's a little bit confusing but I am certain that what I want to achieve is a common pattern, even if I didn't found anything on internet. I'm developing a web app that store ...
damianobellucci's user avatar
2 votes
1 answer
2k views

I 've a pair of private and public ssh keys, which I'm using in encrypting and decrypting my JWT. So I'm creating and signing my JWT with my private key and shared the public key with the client who ...
megamind79's user avatar
0 votes
1 answer
103 views

How can i realize password authenticated key retrieval? I found some description of PAKR: A PAKR (Password-Authenticated Key Retrieval) protocol and its multi-server system allow one party (say, ...
Zoe's user avatar
  • 11
1 vote
1 answer
316 views

In my project I must implement a feature for encrypting some information when it is written into the database, and decrypt the information when it is reloaded. Should this concept be implemented in ...
BruceStackOverFlow's user avatar
1 vote
0 answers
340 views

right now application is storing a file data in database and we are considering instead to store a link (http, ftp, etc) to the file and its checksum. We will only provide a service and the service ...
hazimdikenli's user avatar
-4 votes
1 answer
142 views

I have done weeks researching this question for my App Idea. Background of the APP - Simply a multi crypto currency wallet which users sign up with ONLY username and Password - no email, FB, or ...
Luke Tails's user avatar
7 votes
3 answers
12k views

I am doing a bit of research on hash functions. I understand the concept that it is an equation that is easy to do one way (you take the number 00011010 for example and do reasonably simple math with ...
user180969's user avatar
2 votes
1 answer
152 views

Let's say we have the following scenario. We have user A and user B and an initial digital document D generated by B. What algorithms and infrastructure are required in order to guarantee/prove ...
J1mak0s's user avatar
  • 49
1 vote
1 answer
532 views

I'm going to encrypt the following data (server side): email, IP, username { *IP*: { email: *email at this IP* username: *username of email IP* } *IP2*: { email: ...
Tobi's user avatar
  • 220
0 votes
1 answer
159 views

I am trying to understand the broader implications of blockchain apart from the main advantage of immutability. Are there any? It seems like the distributed nature of the ledger can be an asset when ...
Matt Cashatt's user avatar
  • 3,325
-1 votes
1 answer
221 views

So one day i was reading about RSA and over there it was written that we can secure the data using the public key. So as an idea can I secure the data on the client itself before sending it to the ...
Nilesh's user avatar
  • 51
5 votes
4 answers
2k views

I'm making a C program that uses GTK3 (best documentation ever) and OpenSSL (worst documentation ever) to simply encrypt/decrypt a file using a password. The encryption and decryption functions are ...
Dellowar's user avatar
  • 508
0 votes
2 answers
68 views

I've been toying with a project idea for a while now but can't quite settle on one important detail. The plan is to write a client that can author and upload WebMs to a server for global viewing (...
user avatar
0 votes
1 answer
2k views

I am building an implementation of the [Merkle-Hellman Knapsack Cryptosystem] for my study.(https://en.wikipedia.org/wiki/Merkle%E2%80%93Hellman_knapsack_cryptosystem) One of the things I would like ...
Qqwy's user avatar
  • 4,947
2 votes
1 answer
2k views

I am looking at A SAT-based Public Key Cryptography Scheme and got inspired to challenge myself to write an implementation of this Cryptography Scheme on Python. A part of the cipher encoding would ...
Kristina's user avatar
1 vote
1 answer
150 views

I'm giving a lecture to novice developers on security and would like to explain ssl and the basics of certificates. For this I would like to convey a vague intuitive understanding of asymmetric key ...
George Mauer's user avatar
  • 2,012
0 votes
1 answer
652 views

What I am interested is the similarities and differences between the two. It is my understanding to present time that Luhn algorithm is a type of checksum function same as some cryptographic hash ...
e.doroskevic's user avatar
1 vote
1 answer
195 views

In order to sign data with personal digital signature in a web application, server side languages like PHP can do the whole job, but that would require that the user uploads his private key, lets say ...
mikl's user avatar
  • 197
3 votes
1 answer
167 views

I recently came across this statement in the Perl documentation: extirpated as a potential munition derived from the sentence: "Creates a digest string exactly like the crypt(3) function in the C ...
Rambatino's user avatar
  • 141
1 vote
1 answer
623 views

I started reading RC4 from a book and was not able to understand some phrases correctly. The RC4 algorithm is remarkably simple and easy to understand. A variable length key of from 1 to 256 bytes ...
zilcuanu's user avatar
  • 135
0 votes
2 answers
3k views

I studied C programming about ten years ago, whiles in Uni,however I would like to pick it up again. I'm looking at developing secure applications that utilize cryptography. Would C be the right ...
Felix Titiati's user avatar
3 votes
1 answer
2k views

Is there a class of hash functions that meets the following specs: Upper and lower bound can be specified Uniqueness is guaranteed as long as the input is between the upper and lower bounds Amount of ...
Justin's user avatar
  • 165
29 votes
7 answers
4k views

A few years ago there was this hacker (don't remember who he was) that full disclosed a vulnerability in a given system, but to make sure nobody took credit for that, he created some kind of PGP key. ...
Fagner Brack's user avatar
4 votes
1 answer
8k views

Using Reverse Lookup Tables, you create a lookup table consisting of the password hash of user accounts. Then you use another table which consists of hashes with guessed passwords. Then you compare ...
JohnMerlino's user avatar
0 votes
1 answer
124 views

I'm making an iOS game. All developers need to determine whether their app uses cryptography or not. My game saves files in the Documents folder. They are .plist files representing dictionaries. They ...
Saturn's user avatar
  • 3,937
2 votes
2 answers
305 views

I'm facing a very real problem and, sadly, I cannot find the answer on my own: I'm hitting my limit as a programmer because my hardware knowledge is not sufficiently advanced at all. It's an issue I'...
Cedric Martin's user avatar
2 votes
5 answers
3k views

I would like to hear advice from the more experienced developers. The project is now in the design stage. It's mobile application and a simple web application. Content is pictures, comments, personal ...
user348173's user avatar
0 votes
2 answers
501 views

Say I'm making a snapchat clone app for Android and iOS. Let's say that I get a snapchat from Baz. I want to pre-download the audio for this snapchat. However, as the developer, I want to secure this ...
Dennis L's user avatar
  • 101
44 votes
6 answers
69k views

Say I want some parts of my software to be encrypted. For example, the credentials for a database, etc. I need to store those values somewhere, but doing so in cleartext would make it easy for an ...
Xophmeister's user avatar
0 votes
1 answer
2k views

I am looking for an idea on how to decipher a columnar transposition cipher without knowing the key or the length of the key. When I take the cipher text as input to my algorithm I will guess the ...
Zack Ef's user avatar
  • 103
153 votes
1 answer
16k views

So someone peer reviewed my work, and he told me that I should always sign my commits and tags cryptographically. When asked why, he didn't know to explain it to me, and said "It's just a good thing ...
Madara's Ghost's user avatar
-2 votes
2 answers
928 views

I am trying to measure the running time of different crypto algorithm. e.g. how long it takes to encrypt/decrypt a block of plaintext. May I ask if C with OpenSSL is the best PL to do this?
ssgao's user avatar
  • 107
6 votes
2 answers
3k views

I write open source .NET class libraries as a hobby and thought about signing them. I can get Visual Studio to generate me a password protected public/private key pair and save it as a .pfx file, but ...
Daniel A.A. Pelsmaeker's user avatar
1 vote
1 answer
687 views

I mean, say you were writing professional grade software that would involve sensitive client information. (Take this in the context of me being an amateur programmer.) Would you use hlib and hmac? ...
temporary_user_name's user avatar
1 vote
1 answer
703 views

I am designing a simple webservice and want to use HMAC for authentication to the service. For the purpose of this question we have: a web service at example.com a secret key shared between a user ...
mrwooster's user avatar
  • 800