encryption

Information regarding .crt file

Hi I have a x.crt file which is used to sign certain contents and a signature file is generated x.sig the x.crt is having a Certificate part which contains a public key a content signature field etc. when i try to parse the x,crt and when i try to generate a x509 certificate its showing invalid DER format if try to extract public key alo...

What to use if not "IPHONE UDID"?

Wow... look at all the "panic stories" online this week regarding using an iPhone's UDID. [[UIDevice currentDevice] uniqueIdentifier] What SHOULD we be using instead? What if the phone is sold to another user... and an app has stored some data on a remote server, based on the phone's UDID? (Of course, I want to avoid the problems w...

Feasibility of modifying BIND9 encryption

Hi there, I am working on coming up for ideas on a final year project for my CS major. One of the ideas suggested by a lecturer that he would be interested in supervising would be an exploration of the application of ID-based encyption to securing DNS. From my preliminary research, I am leaning towards a project whereby I attempt to marr...

TripleDESCryptoServiceProvider FIPS 140-2 Compliance

Hello everybody. I am using the System.Security.Cryptography's TripleDESCryptoServiceProvider in the following manner: TripleDESCryptoServiceProvider CreateCipher() { TripleDESCryptoServiceProvider cipher = new TripleDESCryptoServiceProvider(); cipher.KeySize = 192; cipher.BlockSize = 64; ...

What cipher for encrypting UDP packets?

I have an application that does time-sensitive communications over UDP (like video streaming or a game). Packets may be lost, and do not need to be re-transmitted. What cipher should I use to encrypt the datagrams? I'm leaning towards blowfish in ECB mode. I know ECB mode has problems, but I need to support missing packets, so the enc...

Choosing a encryption key from Diffie-Hellman output

I implemented Diffie–Hellman key exchange in Java with some large groups from RFC 3526. My output is a fairly large array of bytes. Is it safe to use the first 448 bits (56 bytes) of the output for a blowfish key? Should I transform the bytes in any way, or pick any specific bytes for the key? ...

Delphi AES library (Rijndael) tested with KAT Vectors

Hi, for these 2 libraries, Delphi Encryption Compendium v 5.2 TurboPower Lockbox v 2.07 I tested their Rijndael DCB/CBC algorithm with "AES Known Answer Test (KAT) Vectors" obtained at NIST website (http://csrc.nist.gov/groups/STM/cavp/index.html) But, both of these libraries failed the tests. Not sure if it was my testing that has...

Write AES encrypted zip and read encrypted zip via Java

I was looking at this lib http://code.google.com/p/winzipaes/ but it writes temp data to disk which can't happen. We'll be writing sensitive data in the zip and having temp decrypted data written to disk is not good practice for a secure system. If the system exits in the middle of a decryption we're left with a tmp file on disk that's...

What is a good browser level encryption product?

I'm looking for a product that can provide browser-level encryption of textual data before it's sent to a backend server. HTTPS can be the secure transport mechanism but we need the packet to be encrypted on the browser first. The data packet must end up in encrypted form on the backend database. Use case is: user fills out form on the b...

Drop Derby encryption

I have a Java application which uses an embedded Apache Derby DB for storing data. I want to give the user the option to enable/disable encryption of the database. I found ways to encrypt an unencrypted DB, change encryption keys/algorithms, but the one thing that I couldn't find is how to revert from an encrypted DB back to an unencryp...

AVRdude encrypt/decryption HEX file on the fly in VB

Hey all i am looking to decrypt my HEX code file for an ATTiny chip and programming it using the AVRDude command line interface. Problem being, i do not want the user to be able to see what the HEX file is at any given time. Can the VB.net Cryptography crypt the HEX file before i put it onto the server and then decrypt it after the prog...

What does this PHP do? Is it an encoder/decoder?

I don't know php at all; this is more of a question of curiosity. Following the php function below in the text file are a few thousand characters of text, such as xnEFstUhSNWGSx5zTq4X/AUw/rtism+klrBETWg0xE1uwb49rnRxrgrgY5EEp3Y0uvTcvLqhUFOP 4n7LDLQpQ9UACTyuUjGBKmUScQCYLCP08u06t0K3nWTNiM7Q6bQMk/iZBE+UK1ywbVC1Lzr9OOEK Does this php func...

Using OpenSSL and PHP to store data?

Hey everyone, For one of roles, I've been receiving a couple of documents from people via email. It's non-sensitive data so email is fine, but I'd like to make a small portal where people can upload the files and only when they submit all the files required do I get notification that the request is complete. Regardless of content, I'd ...

php mysql_connect security

If a web server and a database server are on different hosts, is it possible for a hacker to do packet sniffing or use some other method to get the database username/password when you use mysql_connect in the PHP code? ...

Cryptographically-secure pseudorandom number generator seed

Do we need to seed a CSPRNG with a truly random number? Examples and documentation use truly random numbers, but no justification is given (that I can find). If we were to seed one with a pseudorandom number, I don't see what the difference would be compared to with a truly random seed. If someone finds either of the seeds, then the e...

Which encryption method would produce this result

I am doing a security review on a system. From one part of the system to another, information is sent using an encrypted string. This string is over 400 characters long, but within it are 4 sets of 10 identical characters. I am assuming that the data that was encrypted also has this pattern, for example the word "parameters". I have t...

Encrypted email test data set

I'm looking for a set of emails encrypted (and signed) by a variety of email clients in order to test a mail client. A downloadable mbox file along with test gpg keys would be ideal for this. There seem to be a variety of ways that emails are encrypted (and signed), so getting all of them to work is difficult. And then you find another ...

XOR Encryption in Java: losing data after decryption

Hi, I'm currently writing a very small Java program to implement a one-time-pad, where the pad (or key) itself is generated as a series of bytes using a SecureRandom object, which is seeded using a simple string with the SHA-512 algorithm. Generating the one-time-pad hasn't caused any problems, and if I supply the same seed string each...

What is the strongest encryption to use on protecting text ?

Hello all I need to encrypt text what is the best encryption to use programmatically ? In general I have input file with string that I need to encrypt then read the file in the application Decrypt it for the application flow . with c++ ...

Portable USB Encryption Tool

I need setup USB devices with encrypted data that a user would be able to access the first time with an initial password, be made to change that password on first access, and be able to change the password later as well. It only needs to run on Windows XP SP 2 and later. It would be nice if it could run without administrator privileges...