Skip to main content
2 votes
1 answer
46 views

I'm moving the hash logic to convert a project developed in Node.js to Spring Boot. The digest value and salt value generated in Node.js are stored in the DB, and when I search for the salt value ...
이정인's user avatar
0 votes
0 answers
73 views

Currently applying the PBKDF algorithm, the results for Android and iOS are different. I confirmed that the values ​​of password and salt, which are the values ​​just before applying the algorithm, ...
yoonwoo4429's user avatar
1 vote
0 answers
140 views

I'm trying to implement XML encrypting/decrypting application module in C# with Bouncy Castle using official interop test files, specifically for encrypting using certificates with elliptic curves. ...
azur3's user avatar
  • 63
0 votes
1 answer
230 views

how to use the pbkdf2 derivation function in the (firefox) browser's webcrypto api to obtain the same result as the sjcl.misc.pbkdf2 function (stanford javascript crypto library) or the “derive pbkdf2 ...
Patatetom's user avatar
1 vote
0 answers
657 views

I want to hash some passwords in my Project with .NET Framework Version 4.8 using PBKDF2, since it is the only algorithm that is natively implemented. So I coded a class hashing passwords with the ...
Graf's user avatar
  • 95
0 votes
2 answers
1k views

I have a question regarding this vulnerability. I'd like to know what this actually means. Is it just some fantasy of GitHub Dependabot, or it is really something dangerous? If I use it to encrypt my ...
Eugene1111's user avatar
0 votes
0 answers
135 views

My partner is using https://github.com/realindiahotel/PWDTK.NET to encode passwords of users. We plan to import those users to another application, and we have to use same encoders. My application is ...
skrgahr's user avatar
4 votes
1 answer
528 views

I'm developing an iOS application in Swift and need to encrypt some text, and want to use the user password as the encryption key. To be able to do so securely, I need to derive a symmetric key from ...
Enric's user avatar
  • 350
0 votes
0 answers
76 views

I'm making a portal website for my own company. It stores some sensitive user data and i want to store it encrypted. But before actually implementing anything like this i want to be certain and obtain ...
Dstat93's user avatar
  • 11
2 votes
1 answer
367 views

I have created a binary executable using a C++ program which take a random password which is of 32 characters as command line argument, convert that into raw bytes and pass it to a AES 256 bit ...
Thinker-101's user avatar
0 votes
1 answer
427 views

I have some passwords hashed with C# using Rfc2898DeriveBytes.Pbkdf2(bytes,src,5000,HashAlgorithmName.SHA1,24) (an older implementation) and would like to port this code to java. However I don't seem ...
ieugen's user avatar
  • 2,335
1 vote
0 answers
66 views

I have a working python AES-256-GCM snippet from https://stackoverflow.com/a/77376155/22814155: from Crypto.Cipher import AES from Crypto.Hash import SHA512 from Crypto.Protocol.KDF import PBKDF2 # ...
swampPI's user avatar
  • 13
0 votes
0 answers
218 views

I am trying to compute a master key with the pbkdf2_hmac. Please help me with the latest arguments that we need to pass in the pbkdf2_hmac for computing the key. from hashlib import pbkdf2_hmac, ...
Novice123's user avatar
0 votes
1 answer
126 views

I'm attempting to decrypt some values in an Apache Nifi (1.23.1) flow.xml.gz (or flow.json.gz) file in Python. From doing some patching of the Java files, I've found the following information: Field ...
swampPI's user avatar
  • 13
0 votes
1 answer
226 views

I've tried to calculate a hashed password. The mechanism is decribed here: German: https://avm.de/fileadmin/user_upload/Global/Service/Schnittstellen/AVM_Technical_Note_-_Session_ID_deutsch_2021-05-03....
Adrian Preuss's user avatar

15 30 50 per page
1
2 3 4 5
30