Skip to main content
Filter by
Sorted by
Tagged with
0 votes
0 answers
47 views

Given this specific cipher design and known-plaintext corpus, is there a cryptanalytic or structural weakness that enables key recovery or decryption faster than brute force? The setup is: There’s a ...
Mashal Bhatti's user avatar
9 votes
3 answers
1k views

Take a look at the function SHA1Transform taken from an SHA1 algorithm on Github. Assuming SHA1HANDSOFF is defined, the function looks like this: void SHA1Transform( uint32_t state[5], const ...
Andreas's user avatar
  • 10.6k
1 vote
1 answer
68 views

Title: pepk.jar fails with javax.crypto.BadPaddingException preventing Play App Signing enrollment for existing app Problem Statement: We are trying to enroll an existing Android app (com.clsreview....
user32034397's user avatar
Advice
1 vote
2 replies
47 views

Decentralization in blockchain means data isn’t controlled by one authority. Instead, it’s distributed across many independent nodes, making the system more secure, transparent, and resistant to ...
Verificationstreet's user avatar
Advice
0 votes
0 replies
84 views

(If you want to skip to the part I ask the question, scroll down to the last section with the heading "Concrete question".) I’m working on a home lab / learning project and would appreciate ...
Pandofla's user avatar
2 votes
1 answer
134 views

I have the following code that should encrypt a string with a password in nodeJS. You can find an example here: https://jsfiddle.net/ujr4gev3/1/ I have also tried the approach here: https://gist....
user31167817's user avatar
2 votes
1 answer
223 views

I am trying to upgrade my phpseclib-based scripts to the latest, which is version 3. (Previously, I was using version 2.) I have run into a number of problems, beginning with the fact that class ...
Dennis 's user avatar
  • 1,278
2 votes
2 answers
161 views

I'm developing a tool that stores a signer's biometric data inside a PDF together with the digital signature, but I'm unsure where this information should be embedded. The biometric data is captured ...
nex0's user avatar
  • 23
Advice
0 votes
1 replies
105 views

I'm trying to find a secure way to store token for my cli application. In the app I take the token from ms entra id and I want to store this token in user computer so that user can use it again until ...
Jantoma21's user avatar
  • 495
0 votes
1 answer
155 views

I am trying to create an application to sign xml documents in xades format by using PKCS11Interop library. I have a xades sign application provided by a government institute to test my results. I am ...
Omer Harmansa's user avatar
1 vote
1 answer
151 views

I'm migrating my Diffie-Hellman (DH) implementation from OpenSSL 1.1 to OpenSSL 3.0. Previously, I used APIs like DH_set0_pqg, but these are now deprecated. I am switching to the EVP_PKEY-DH interface ...
PKRG's user avatar
  • 637
1 vote
0 answers
143 views

I'm using OpenSSL 3.0 EVP_PKEY in C to perform Diffie-Hellman key exchange. I generate Alice's and Bob's key pairs. I extract Bob's public key as a BIGNUM and try to reconstruct an EVP_PKEY for Bob's ...
PKRG's user avatar
  • 637
0 votes
0 answers
99 views

I'm trying to sign a JWT with a key that is stored in an Azure Keyvault using the keyvault as signer, in a way that the actual private part of the key never leaves the keyvault. I've come-up with the ...
Leonardo's user avatar
  • 11.5k
1 vote
0 answers
87 views

For FIPS mode, I added ClientSignatureAlgorithm in opensslcnf.txt. This change was done for FIPS mode using the crypto-policies package. The support ciphers for ClientSignatureAlgorithms are same as ...
Akshit Soneji's user avatar
2 votes
1 answer
315 views

Recently, on a project, I encountered the need for uniformly distributed integers within an arbitrary range [a, b] from random bytes, a problem that is quite common and is usually solved using ...
Marz's user avatar
  • 23

15 30 50 per page
1
2 3 4 5
1017