Skip to main content
Filter by
Sorted by
Tagged with
-7 votes
0 answers
64 views

I'm doing a lab on information security. I can't decrypt the text. I started the work with a literal logical selection: I assumed that each letter in ascending order is a specific letter in the ...
Роман Сысоев's user avatar
Advice
0 votes
0 replies
77 views

(If you want to skip to the part I ask the question, scroll down to the last section with the heading "Concrete question".) I’m working on a home lab / learning project and would appreciate ...
Pandofla's user avatar
2 votes
1 answer
110 views

I have the following code that should encrypt a string with a password in nodeJS. You can find an example here: https://jsfiddle.net/ujr4gev3/1/ I have also tried the approach here: https://gist....
user31167817's user avatar
2 votes
1 answer
188 views

I am trying to upgrade my phpseclib-based scripts to the latest, which is version 3. (Previously, I was using version 2.) I have run into a number of problems, beginning with the fact that class ...
Dennis 's user avatar
  • 1,280
2 votes
2 answers
146 views

I'm developing a tool that stores a signer's biometric data inside a PDF together with the digital signature, but I'm unsure where this information should be embedded. The biometric data is captured ...
nex0's user avatar
  • 23
Advice
0 votes
1 replies
93 views

I'm trying to find a secure way to store token for my cli application. In the app I take the token from ms entra id and I want to store this token in user computer so that user can use it again until ...
Jantoma21's user avatar
  • 495
0 votes
1 answer
143 views

I am trying to create an application to sign xml documents in xades format by using PKCS11Interop library. I have a xades sign application provided by a government institute to test my results. I am ...
Omer Harmansa's user avatar
1 vote
1 answer
143 views

I'm migrating my Diffie-Hellman (DH) implementation from OpenSSL 1.1 to OpenSSL 3.0. Previously, I used APIs like DH_set0_pqg, but these are now deprecated. I am switching to the EVP_PKEY-DH interface ...
PKRG's user avatar
  • 637
1 vote
0 answers
139 views

I'm using OpenSSL 3.0 EVP_PKEY in C to perform Diffie-Hellman key exchange. I generate Alice's and Bob's key pairs. I extract Bob's public key as a BIGNUM and try to reconstruct an EVP_PKEY for Bob's ...
PKRG's user avatar
  • 637
0 votes
0 answers
94 views

I'm trying to sign a JWT with a key that is stored in an Azure Keyvault using the keyvault as signer, in a way that the actual private part of the key never leaves the keyvault. I've come-up with the ...
Leonardo's user avatar
  • 11.5k
1 vote
0 answers
79 views

For FIPS mode, I added ClientSignatureAlgorithm in opensslcnf.txt. This change was done for FIPS mode using the crypto-policies package. The support ciphers for ClientSignatureAlgorithms are same as ...
Akshit Soneji's user avatar
2 votes
1 answer
314 views

Recently, on a project, I encountered the need for uniformly distributed integers within an arbitrary range [a, b] from random bytes, a problem that is quite common and is usually solved using ...
Marz's user avatar
  • 23
2 votes
0 answers
72 views

I am developing software that uses OpenSSL for implementing a TLS client. I am developing it in the C++ language, to run in Linux for ARM 64-bit. I intend to use the cipher TLS_PSK_WITH_NULL_SHA256. ...
ruben2020's user avatar
  • 1,569
5 votes
1 answer
198 views

Using AES in C# I wrote two static methods for encryption and decryption. Encrypt: static byte[] Encrypt(byte[] plaintext, byte[] Key, byte[] IV) { byte[] encrypted_data = null; using (Aes ...
Alternate's user avatar
0 votes
1 answer
197 views

Assuming we know the key and the IV for the data we're getting from the stream, is it possible to decrypt it within stream? I encrypted the same message three times and then decrypted it all at once, ...
user30252103's user avatar
1 vote
0 answers
182 views

Here is the function: export function generateId(): string { const chars = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ"; let result = ""; const randomArray = new Uint8Array(8); ...
Danny Adams's user avatar
1 vote
1 answer
88 views

I have a piece of code deployed in Azure Container Apps that primarily copies the file from the staging Azure blob storage to the final Azure blob storage and computes the SHA256 hash. However, I have ...
Jana's user avatar
  • 151
1 vote
2 answers
118 views

I have simple code to encrypt and decrypt as follows... (1) To encrypt: from Crypto.Cipher import AES from Crypto.Util.Padding import pad, unpad from Crypto.Hash import SHA256 as sha256 def sha(text):...
deostroll's user avatar
  • 12k
1 vote
0 answers
70 views

The Cipher states that Java platforms require to support following transformations and keysizes. AES/CBC/NoPadding (128) AES/CBC/PKCS5Padding (128) AES/ECB/NoPadding (128) AES/ECB/PKCS5Padding (128) ...
Jin Kwon's user avatar
  • 22.4k
0 votes
0 answers
70 views

Background I’m implementing Asynchronous Distributed Key Generation (ADKG) over secp256k1 so that N nodes collectively hold a threshold private key. After DKG each node has a secret share. To sign an ...
Shubham Gupta's user avatar
3 votes
0 answers
139 views

The following application performs a basic HTTP GET request against https://google.com, retrieves the peer certificate and saves it in PEM format into a file called cert.pem. After that it attempts ...
jwa's user avatar
  • 3,307
2 votes
1 answer
91 views

C# .Net Framework 4.8. I am using CryptoStream Reader to decrypt an encrypted datastream within a Using {} block. If the Key used for decryption is incorrect, the CryptoStream Reader throws an ...
Himilou's user avatar
  • 177
1 vote
1 answer
89 views

Here is the .NET 9 code that creates a self-signed EC cert, persists to a .PEM file and attempts re-create the certificate from the .PEM file. // Generate ECC key pair using var ecdsa = ECDsa....
Raghu's user avatar
  • 3,111
0 votes
1 answer
128 views

I'm using pyinstaller main2.spec command. The main2.spec file is the next: # -*- mode: python ; coding: utf-8 -*- a = Analysis( ['main.py'], pathex=[], binaries=[], datas=[ ('./...
Paul de la Cruz's user avatar
1 vote
1 answer
86 views

The question is about where session objects are created and stored - on a token or in RAM of an application that uses a pkcs11 library? It seems that pkcs11 specification does not differentiate them ...
user77777777's user avatar
1 vote
1 answer
194 views

Is there a standard way to validate an Ed25519 public key (check that it's really a point on the curve and not some random bytes) using the standard Java Crypto APIs and/or BouncyCastle? I found a ...
algrid's user avatar
  • 6,034
1 vote
1 answer
140 views

While reading the ChaCha20 cipher's source code, I noticed something unusual. The algorithm's constants (like 0x61707865) aren't converted for endianness, yet this doesn't cause issues across ...
S-N's user avatar
  • 402
0 votes
1 answer
170 views

I'm trying to derive a bech32 address on the Injective chain using a mnemonic and the Ethereum HD path (m/44'/60'/0'/0/0). Here's the code I'm using: import { DirectSecp256k1HdWallet } from '@cosmjs/...
Eric Lee's user avatar
  • 501
1 vote
1 answer
81 views

I have a .Net application, let's call it MyApplicationDotNet, that currently communicates with Gemalto IdPrime 510 smartcards based on .Net technology, I need to make it use javacard. Is it necessary ...
Etantonio's user avatar
  • 413
0 votes
1 answer
169 views

I am attempting to sign a transaction created using TronGrid's https://api.trongrid.io/wallet/createtransaction endpoint. My current code looks like this, where JsonNode txNode passed to ...
Andrey Belenkiy's user avatar
0 votes
0 answers
108 views

I’m using Fireblocks raw signing to sign Aptos transactions because it holds the private key. I generated the Aptos address from the public key provided by Fireblocks, and this address can receive ...
Saleem Araidy's user avatar
0 votes
0 answers
117 views

I have a TR34 sample enveloped data from X9 TR34–2012. I am trying to decrypt it, but I am not sure which part of the token contains encrypted ephemeral key and which exact rsa algorithm is used for ...
etna's user avatar
  • 23
0 votes
0 answers
67 views

I'm looking to use the lattice-estimator here: https://github.com/malb/lattice-estimator?tab=readme-ov-file which depends on SageMath. I have installed SageMath here: john@sage:~/Downloads/sage-10.6$ ...
TecGuy94's user avatar
-2 votes
1 answer
111 views

I want to protect a RSA private key stored in localStorage by wrapping it with a key derived from the user's password. However when unwrapping the key the error DOMException: An invalid or illegal ...
iKingNinja's user avatar
0 votes
1 answer
114 views

Why does a ECDSA-signed JWT in .NET fail validation in PHP when using OpenSSL, even with matching keys and algorithms? In .NET using System.Security.Cryptography and System.IdentityModel.Tokens.Jwt ...
Yousha Aleayoub's user avatar
1 vote
1 answer
90 views

I would like to add RSA encryption in my server (Python FastAPI) and my Android app. But the encryption didn't work as the way I expected. I already have AES-GCM encryption/decryption working between ...
kunteinzo's user avatar
2 votes
1 answer
182 views

The following script I found here. The idea explained here is that if for a single signature both the high order bits of the private key and nonce are set to 0, then it’s possible to combine those 2 ...
user2284570's user avatar
  • 3,119
1 vote
1 answer
133 views

The goal is to read a certificate and parse the ASN.1 elements for further use. I managed to instantiate the reader as follows with no issues: AsnReader readerAll = new AsnReader(new ReadOnlyMemory&...
Tamil Shenbaga Selvi's user avatar
0 votes
0 answers
86 views

I have a question regarding BLS signatures and aggregate signature verification in smart contracts. Let’s say I have 3 honest signers, each with their own private key. They all sign the same message, ...
sh3ifu's user avatar
  • 29
1 vote
0 answers
95 views

I want to store a short string like "foo: bar, abc: def" inside of the TPM. While tss2 CLI commands seem to work pretty well in doing so, I feel pretty lost in trying to achieve the same ...
hoipa's user avatar
  • 11
-1 votes
1 answer
106 views

I'm building a crypto-focused landing page (https://blockwealth.com.au/cryptolandingpage/) using React, and I want to allow users to connect their MetaMask wallet for potential interactions like token ...
Block Wealth's user avatar
2 votes
0 answers
190 views

I am having problem deriving secret from account credential to create a key password which will enable me to create a cryptographic key on the server. The calculation of the signatures (Key signature ...
Mmaduegbunam Elochukwu's user avatar
0 votes
1 answer
164 views

I'm trying to write an app in flutter to perform softap provisioning for an ESP32-C6 (https://docs.espressif.com/projects/esp-idf/en/v5.4.1/esp32c6/api-reference/provisioning/wifi_provisioning.html). ...
Kari Cordes's user avatar
0 votes
1 answer
158 views

Given a supplied public key, plus my own private key, how do I generate "a shared 128-bit AES-GCM key... using ECDH", using something suitable for the JVM and/or Android? The Tesla Fleet ...
CommonsWare's user avatar
0 votes
0 answers
136 views

I created a VM on google cloud platform. After creating it, I edited /etc/default/grub file by adding additional kernel command line parameters so that I would enable IMA module: ...
Jovan Djukic's user avatar
0 votes
0 answers
99 views

I'm in the process of generating a keystore for signing my Android app, and I'm wondering about the best choice for the signature algorithm. My current command is as follows: KeyTool.exe -genkey -v ^ -...
zeus's user avatar
  • 13.3k
0 votes
0 answers
107 views

I'm using the Botan 3.7.1 library to implement encryption and decryption in C++ for AES-128 in CTR mode. Currently, I'm working on a function for decryption, and it's taking the encrypted input and is ...
almondJoy's user avatar
0 votes
0 answers
64 views

We're working on getting our Android app FedRAMP certified and are looking for a solution to encrypt our database with a FIPS-validated cryptographic provider. SQLCipher offers this capability, but ...
Saijanani Seetharaman's user avatar
-3 votes
2 answers
297 views

I was trying to decrypt a JSON request with a key, hex and textbody but all the codes I found are from 2013 - 2017. I tried using this one namespace AES { using System.IO; using System; ...
Ndifreke James Okpo's user avatar
0 votes
0 answers
93 views

I am trying to call an API written in PHP that generates a token using the following method: base64_encode(hash_hmac("sha256", "<api-key>", "<email>:<gmdate('y-...
Sumudu madushan's user avatar

1
2 3 4 5
305