About 50 results
Open links in new tab
  1. pfx file encryption algorithm - Information Security Stack Exchange

    Jul 9, 2020 · Does this mean that the pfx file is encrypted using TripleDES? Yep. PFX/PKCS#12 files originally used an extended version of PBES1 (Password-Based Encryption Scheme 1) which added …

  2. Method of cryptography that doesn't need encryption key for decryption

    Jul 1, 2023 · Is there a method of cryptography that doesn't need the encryption key for decryption? I thought public-key cryptography would work, but both the private and public keys are needed for …

  3. Does code obfuscation give any measurable security benefit?

    Oct 9, 2019 · One small benefit of obfuscation is information destruction. Things like spoken language, coding habits, etc. The process (ultimately code) can be re-understood, but identifiers are lost. …

  4. How to determine what type of encoding/encryption has been used?

    May 20, 2011 · Is there a way to find what type of encryption/encoding is being used? For example, I am testing a web application which stores the password in the database in an encrypted format …

  5. Techniques for Writing Encryption Algorithms (Exclusively For Personal ...

    Dec 9, 2011 · Techniques for Writing Encryption Algorithms (Exclusively For Personal Use) Ask Question Asked 14 years, 2 months ago Modified 10 years, 3 months ago

  6. Why do best practices recommend against adding your own pepper to ...

    Nov 2, 2024 · Both are perfectly valid applications of standard algorithms. Note that the pepper should be kept in a specialized key store like the Linux Kernel Key Retention Service or on a hardware …

  7. How does TLS work (RSA, Diffie-Hellman, PFS)?

    Mar 18, 2019 · RSA I know that RSA can be used in step 3 above for integrity control, meaning using public-private key asymmetric encryption so pre_master_secret is not readable in plaintext. DH The …

  8. Password Hashing: add salt + pepper or is salt enough?

    Apr 22, 2011 · (Note: using a salt is only half of the job; you also need to make the hash function slow -- so that attacking a single low-entropy password is still difficult. Slowness is usually achieved through …

  9. Steganography to hide text within text - Information Security Stack ...

    Sep 20, 2012 · Are there any steganography algorithms which are capable of hiding a (optionally encrypted) text message within another innocuous text message? The scenario I envisage is that I …

  10. http - How do the processes for digital certificates, signatures and ...

    Sep 22, 2011 · The server responds ("ServerHello") by telling which algorithms will be used; then the server sends his certificate ("Certificate"), possibly with a few CA certificates in case the client may …