Questions tagged [decryption]
The process of decoding data that has been encrypted into a secret format.
399 questions
0 votes
1 answer
118 views
Restrict gpg from decrypting a file encrypted by a subkey which is now expired or revoked [duplicate]
GPG allows file encryption for multiple recipients. I prefer to encrypt files: Only to recipient subkeys shared with me by the intended recipients, like so: $ gpg --encrypt --armor --recipient <...
2 votes
2 answers
300 views
Decrypting hacked wordpress files
My friend asked me why his website seems weird on Google and why meta title seems to be “トリプルフローアイロン”. After checking request logs on his hosting panel and checking files on FTP, it’s clear that the ...
1 vote
1 answer
106 views
How does the key distribution work in TrueCrypt for header encryption and decryption with cascades in XTS mode?
I am currently working on a project where I am trying to replicate the header encryption and decryption logic of TrueCrypt in Java. I have some uncertainties regarding the key generation, distribution,...
1 vote
0 answers
107 views
Secure Encryption via Fingerprint Scanner [closed]
Is it possible to use biometric fingerprint data to secure information? I know a regular fingerprint scanner will find the closest enrolled fingerprint, so it can't be used to find a consistent key ...
0 votes
1 answer
120 views
Decrypting base2i encryption? [closed]
We all know base64, which can be easily decoded, but there's also base2i encryption. Yes, the base is a complex number. I can only find very limited resources online about this. I'm wondering how can ...
2 votes
1 answer
593 views
RC4 decryption with WEP
I just want to make sure what I know is correct about why WEP isnt secure. When a client wants to send data to AP using WEP, the WEP key (which is the password the user uses to connect to wifi – so ...
1 vote
1 answer
397 views
How exactly do corporate companies decrypt employee SSL/HTTPS traffic on company owned corporate devices? [duplicate]
I understand that corporate companies can/do decrypt employee SSL/HTTPs traffic because the company owned device has a company owned SSL certifiate. I thought the first certificate would encrypt the ...
4 votes
1 answer
2k views
Find password decryption used in MSSQL
I have the 2 encrypted passwords in my MSSQL database and I'm trying to decrypt it. Here's one of the encrypted password: E4-68-3F-BE-91-CC-BE-B9-27-4B-18-B1-5F-1B-39-66 The password to the above ...
0 votes
1 answer
158 views
Encryption without a classic exchange scenario
I am working on a project where I need to securely encrypt and decrypt files on a product without the ability for direct communication or key derivation after the product is sold. The challenge is ...
1 vote
0 answers
166 views
Help me securely store and retrieve Social Security numbers [closed]
I am on the very last functionality to implement before launching my app. I have the same requirements someone like Fanduel or Draftkings does. When my users cross the $600 threshold for prizes in the ...
1 vote
0 answers
170 views
CrypTool - How to determine what type of encryption has been used?
I have a few questions about CrypTool. How can you use the text analysis tools available in CrypTool to determine the encryption algorithm for a given ciphertext? How can you use CrypTool's text ...
2 votes
1 answer
577 views
Decrypt SSL with Wireshark supported browsers
I've been following the guide: https://www.comparitech.com/net-admin/decrypt-ssl-with-wireshark/ Using it for chrome and Safari on MacOS does not populate any keys in the file, Did browsers stop keys ...
0 votes
1 answer
465 views
Verification of Password without Storing Hash - Security Considerations
Question: I am working on a password-based file encryption and decryption system in Python using the PBKDF2 key derivation function and Fernet encryption. I have a specific requirement: I want to ...
0 votes
1 answer
242 views
How to properly migrate authentication cookies to using a new encryption scheme on a website while being backwards compatible?
When a user logs in with their email/password combo and gets authenticated to our website, the backend sends the web browser an encrypted cookie based off of their memberId with us. While this ...
0 votes
0 answers
220 views
Wireshark can't decrypt TLS from a specific python library
I have a problem. I'm using Wireshark 4.0.8. I created my ssl file to store my "(pre)-master-secrets". I can thus decrypt TLS from my browser or from different python libraries without ...