Skip to main content

Questions tagged [cryptography]

Cryptography is the practice and study of logical means used to achieve information confidentiality, integrity and authenticity. It covers, among other things, encryption (making some data unreadable except for those who know a given secret element, called a key), data hashing (in particular for password storage) and digital signatures (provable integrity and authenticity with non-repudiation).

0 votes
0 answers
72 views

I'm struggling to come up with a better encryption model for this scenario: User is mobile app user Small (USA) company with small budget wants to store data encrypted at rest per user in cloud ...
dotmainframe's user avatar
0 votes
1 answer
98 views

Context I have a GUI application with a proprietary scripting language. There is a library that starts a python child process from the GUI which listens on a tcp socket and runs any script command ...
Kayson's user avatar
  • 101
0 votes
1 answer
88 views

Context: CloudKit is a framework that lets app developers store key-value data, structured data, and assets (large data stored separately from the database, such as images or videos) in iCloud. ...
user134238's user avatar
0 votes
1 answer
104 views

Why is a password be presented during 'kinit' to authenticate with Kerberos? Cryptographically? In this post the Kerberos protocol is described and it appears to use symmetric keys. Given that, I ...
atod's user avatar
  • 47
1 vote
1 answer
99 views

I've been considering switching from SRP to OPAQUE, because I like the idea that verifiers (which can be subject to dictionary attacks) are never communicated over the protocol, even during ...
Dolda2000's user avatar
  • 293
2 votes
1 answer
662 views

When implementing JSON Web Encryption (JWE), I understand the reasons why you might choose A256KW over DIR. But, now I notice there is also A256GCMKW as an optional part of the JWE standard (see ...
Simon Kissane's user avatar
1 vote
0 answers
121 views

I am looking for reputable libraries or solution providers that offer reliable, well-maintained, and well-documented implementations of post-quantum cryptographic (PQC) algorithms. Specifically, I am ...
Geek's user avatar
  • 19
9 votes
2 answers
4k views

I have a theoretical question regarding the comparison of password-based encryption and password hashing. Not sure if Stackoverflow or crypto is the best place, but this is more on the side of ...
Landon Crabtree's user avatar

15 30 50 per page
1
2 3 4 5
160