Skip to main content

Questions tagged [decryption]

The process of decoding data that has been encrypted into a secret format.

0 votes
1 answer
118 views

GPG allows file encryption for multiple recipients. I prefer to encrypt files: Only to recipient subkeys shared with me by the intended recipients, like so: $ gpg --encrypt --armor --recipient <...
Suhas Srivastava's user avatar
2 votes
2 answers
300 views

My friend asked me why his website seems weird on Google and why meta title seems to be “トリプルフローアイロン”. After checking request logs on his hosting panel and checking files on FTP, it’s clear that the ...
P P's user avatar
  • 29
1 vote
1 answer
106 views

I am currently working on a project where I am trying to replicate the header encryption and decryption logic of TrueCrypt in Java. I have some uncertainties regarding the key generation, distribution,...
BinomialBear's user avatar
1 vote
0 answers
107 views

Is it possible to use biometric fingerprint data to secure information? I know a regular fingerprint scanner will find the closest enrolled fingerprint, so it can't be used to find a consistent key ...
Ezlanding's user avatar
  • 125
0 votes
1 answer
120 views

We all know base64, which can be easily decoded, but there's also base2i encryption. Yes, the base is a complex number. I can only find very limited resources online about this. I'm wondering how can ...
No Name's user avatar
  • 227
2 votes
1 answer
593 views

I just want to make sure what I know is correct about why WEP isnt secure. When a client wants to send data to AP using WEP, the WEP key (which is the password the user uses to connect to wifi – so ...
winstar345's user avatar
1 vote
1 answer
397 views

I understand that corporate companies can/do decrypt employee SSL/HTTPs traffic because the company owned device has a company owned SSL certifiate. I thought the first certificate would encrypt the ...
IMTheNachoMan's user avatar
4 votes
1 answer
2k views

I have the 2 encrypted passwords in my MSSQL database and I'm trying to decrypt it. Here's one of the encrypted password: E4-68-3F-BE-91-CC-BE-B9-27-4B-18-B1-5F-1B-39-66 The password to the above ...
Elaine Byene's user avatar
0 votes
1 answer
158 views

I am working on a project where I need to securely encrypt and decrypt files on a product without the ability for direct communication or key derivation after the product is sold. The challenge is ...
mrx's user avatar
  • 1
1 vote
0 answers
166 views

I am on the very last functionality to implement before launching my app. I have the same requirements someone like Fanduel or Draftkings does. When my users cross the $600 threshold for prizes in the ...
T M's user avatar
  • 11
1 vote
0 answers
170 views

I have a few questions about CrypTool. How can you use the text analysis tools available in CrypTool to determine the encryption algorithm for a given ciphertext? How can you use CrypTool's text ...
Qmails's user avatar
  • 11
2 votes
1 answer
577 views

I've been following the guide: https://www.comparitech.com/net-admin/decrypt-ssl-with-wireshark/ Using it for chrome and Safari on MacOS does not populate any keys in the file, Did browsers stop keys ...
S3Im's user avatar
  • 21
0 votes
1 answer
465 views

Question: I am working on a password-based file encryption and decryption system in Python using the PBKDF2 key derivation function and Fernet encryption. I have a specific requirement: I want to ...
Patrickliu's user avatar
0 votes
1 answer
242 views

When a user logs in with their email/password combo and gets authenticated to our website, the backend sends the web browser an encrypted cookie based off of their memberId with us. While this ...
user1068636's user avatar
0 votes
0 answers
220 views

I have a problem. I'm using Wireshark 4.0.8. I created my ssl file to store my "(pre)-master-secrets". I can thus decrypt TLS from my browser or from different python libraries without ...
Big BG's user avatar
  • 1

15 30 50 per page
1
2 3 4 5
27