Skip to main content

Questions tagged [cryptography]

Cryptography is the practice and study of logical means used to achieve information confidentiality, integrity and authenticity. It covers, among other things, encryption (making some data unreadable except for those who know a given secret element, called a key), data hashing (in particular for password storage) and digital signatures (provable integrity and authenticity with non-repudiation).

0 votes
0 answers
72 views

I'm struggling to come up with a better encryption model for this scenario: User is mobile app user Small (USA) company with small budget wants to store data encrypted at rest per user in cloud ...
dotmainframe's user avatar
0 votes
0 answers
157 views

I came to ask this doubt here, because, it ended being more an operating system's security heuristics/cryptological question than a pure reverse-engineering one. Question is about UAC and its ...
nostromo's user avatar
  • 101
0 votes
1 answer
98 views

Context I have a GUI application with a proprietary scripting language. There is a library that starts a python child process from the GUI which listens on a tcp socket and runs any script command ...
Kayson's user avatar
  • 101
0 votes
1 answer
85 views

Context I decided to learn (or rather refresh my skills in) Java by creating a local-first desktop app for encrypted notes. Imagine a light version of Joplin (with less functionality) with notes ...
Kote Isaev's user avatar
0 votes
1 answer
89 views

Context: CloudKit is a framework that lets app developers store key-value data, structured data, and assets (large data stored separately from the database, such as images or videos) in iCloud. ...
user134238's user avatar
1 vote
0 answers
111 views

I’m exploring a data security concept where files do not exist as conventional static entities but instead “float” as encrypted fragments, retrievable only through specific contextual parameters. The ...
Cero's user avatar
  • 21
0 votes
1 answer
104 views

Why is a password be presented during 'kinit' to authenticate with Kerberos? Cryptographically? In this post the Kerberos protocol is described and it appears to use symmetric keys. Given that, I ...
atod's user avatar
  • 47
0 votes
1 answer
105 views

Application For the application, I have a user password encrypted private-key, which is basically the root-key stored in servers. User is prompted for password when he logs in, it decrypts the private ...
Dana v's user avatar
  • 51
1 vote
1 answer
100 views

I've been considering switching from SRP to OPAQUE, because I like the idea that verifiers (which can be subject to dictionary attacks) are never communicated over the protocol, even during ...
Dolda2000's user avatar
  • 295
5 votes
0 answers
269 views

I read their security model which explains how they laid out all these layers. https://proton.me/blog/protondrive-security Files and folders are structured in a tree and called nodes. Each node (file/...
Dana v's user avatar
  • 51
2 votes
1 answer
668 views

When implementing JSON Web Encryption (JWE), I understand the reasons why you might choose A256KW over DIR. But, now I notice there is also A256GCMKW as an optional part of the JWE standard (see ...
Simon Kissane's user avatar
2 votes
0 answers
149 views

This may be a newbie question. A friend ("Bob") and I have tried to sign each others' keys according to these instructions. I want to get Bob's signature on my public key into my own ...
Tom Stepleton's user avatar
1 vote
0 answers
124 views

I am looking for reputable libraries or solution providers that offer reliable, well-maintained, and well-documented implementations of post-quantum cryptographic (PQC) algorithms. Specifically, I am ...
Geek's user avatar
  • 19
3 votes
1 answer
472 views

When I change the parallelism parameter on Scrypt or on Argon2, which processing unit's threads do I influence? The CPU's threads? The GPU's threads? How does this all work?
The Death Sidius's user avatar
9 votes
2 answers
4k views

I have a theoretical question regarding the comparison of password-based encryption and password hashing. Not sure if Stackoverflow or crypto is the best place, but this is more on the side of ...
Landon Crabtree's user avatar

15 30 50 per page
1
2 3 4 5
160