Skip to main content

Questions tagged [cryptography]

0 votes
1 answer
192 views

I am writing an API for a payment system. Third parties can register callback URLs that are linked to an account ID so that whenever a transaction involving that account ID is updated, my API calls ...
Adrian Albert Koch's user avatar
1 vote
2 answers
418 views

We're building an application that needs to log into a website using built-in credentials. It's not optimal to say the least, but we're stuck with "knowing" the username and password ...
glades's user avatar
  • 493
0 votes
2 answers
204 views

I am familiar with and see the benefits of Subresource Integrity (SRI). I understand that with SRI, once you've added a script reference with the correct integrity attribute, if the remote script is ...
Rounin's user avatar
  • 295
4 votes
3 answers
283 views

Regarding cryptography and the issue of collisions, I posed a question as to whether it was ever possible to store every single possible combination of a bit array of a particular size, in a bit array ...
Anon's user avatar
  • 3,649
2 votes
2 answers
326 views

Background Tertiary to this question, I have been building my own imageboard that prevents [for example] duplicate images from being downloaded again and again on behalf of the client. How I do this, ...
Anon's user avatar
  • 3,649
2 votes
1 answer
161 views

I have a set of UUIDs that I want to assign to a set of people. I want to deliver these UUIDs to people in a secure manner, such that everyone knows that I do not know which UUID corresponds to which ...
Ian Knight's user avatar
-1 votes
1 answer
98 views

Now that Tesla has bought a large amount of BitCoin, other companies may follow suit. If my company wanted to do that, I was thinking about how it could be done. I'm familiar with the way private ...
NealWalters's user avatar
0 votes
1 answer
409 views

I am currently building a small application which used a public API to get some information. The API doesn't support auto-login in any way (don't know if something like this even exists with APIs), ...
29thDay's user avatar
-2 votes
1 answer
169 views

I was wondering if there was a way to encode binary data, such as Crypto addresses into a natural language format, in a similar fashion to how what3words.com can encode locations into three easy-to-...
Sagar Patil's user avatar
5 votes
2 answers
5k views

I am planning to implement a cryptographic library for several languages and looking for best practices. I have looked at several threads, especially this, this, and this one, which answer my ...
mushishi's user avatar
1 vote
2 answers
513 views

I'm just reviewing some of my code and thought I'd throw this out there for comment. I have a factory class that builds and returns a class for RSA Crypto tasks. It implements IDisposable. All the ...
Jammer's user avatar
  • 184
1 vote
1 answer
672 views

I am starting to look into how to implement SHA256 in JavaScript, and found this for example. It requires UTF-8 encoding it sounds like. Another one I saw required/supported only ASCII encoding and ...
Lance Pollard's user avatar
2 votes
1 answer
162 views

I am looking at all the green and red boxes here, and am wondering what it would look like if one were to "implement TLS" today? What should you implement if you were to implement TLS today? Do you ...
Lance Pollard's user avatar
1 vote
1 answer
188 views

Despite various ways to scrub sensitive data in volatile memory (see Survive DSE or Zeroing buffers), programs tend to perform transparent memory copies (such as a Garbage Collection). The newly ...
weir007's user avatar
  • 37
1 vote
1 answer
295 views

A PHP based webshop running on a shared hosting stores libsodium encrypted personal data in it's MySQL database. To let users have access to their own data, a design very similar to the one discussed ...
goToAndPlay's user avatar

15 30 50 per page
1
2 3 4 5