I need to export private key from Windows store. What should I do if key marked as non-exportable? I know that it is possible, program jailbreak can export this keys.
To export key I use Org.BouncyCastle.Security.DotNetUtilities.GetKeyPair() that export key from (RSACryptoServiceProvider)cryptoProv.ExportParameters(true). Exported key I...
How to encrypt WHOLE an xml file using C#?
...
Hey,
I have a couple different bits of code but the short story is I insert some passwords into a MySQL database using SHA1 and also compute SHA1 hashes into .NET and they are not matching. I think this is a problem with my encoding code in .NET.
SQL Code:
INSERT INTO user_credentials (Password) VALUES (SHA1('password'));
password h...
Does anybody know any php alternative to coldfusion's cfusion_encrypt?
Currently cfusion_encrypt is still used via curl and its trouble since the cf server keeps going down. It would be a lot better if anyone could give me a php alternative to this function.
Thanks.
...
Hi,
I created a GUI application in VC++ and now I wanted to do a AES128 encryption to the data, I am writting to it.
Can anyone please let me know how can I do that in VC++.
...
This is the method
public function _PRZ_decrypt_data($_salt, $_input)
{
return trim(mcrypt_decrypt(MCRYPT_RIJNDAEL_256, $_salt, $_input, MCRYPT_MODE_ECB, $this->_PRZ_get_iv()));
}
I am calling it as one of my parameters as follows
$this->_PRZ_decrypt_data($salt, base64_decode($code))
It seems to be returning a 1 when a prope...
I'm porting my application from WPF to Silverlight. The biggest problem is that my application uses RSA encryption and Deflate compression, and both classes are not available in Silverlight.
I know that you can view the sourcecode of any .NET class using reflection, so would it be possible to just 'decompile' the RSACryptoService class,...
Alright I am working on a system for managing a bunch of vps. This includes mundane maintenance tasks as well as resource allocation.
In order to accomplish this my control server will need to be connecting to the various servers. I regularly use ssh public/private key and this seems like the most logical way to connect from the control...
I am beginning to learn crypto algorithms and I understand how the above mentioned algorithms work. Is it that the key length of AES is longer? Which steps of AES encryption makes it less vulnerable than DES?
...
I have a web based application that requires images to be encrypted before they are sent to server, and decrypted after loaded into the browser from the server, when the correct key was given by a user.
[Edit: The goal is that the original image and the key never leaves the user's computer so that he/she is not required to trust the s...
Hi,
I am using JSON for data exchange between my mobile client and the server. I am using that for some sensitive data transfers. However is their any risk in this data format or any security consideration using JSON format? Also the communication is done in HTTPS.
Also I need to know whether we need to apply basic encryption standard...
hello
i work on an application , my application read serial number's a device , i want check the
serial number and my application work just with this device and does not work with other device
how do i encrypte and check this serial number that my application is not crackeable??
thanks
...
I am working on an Android app and have a couple strings that I would like to encrypt before sending to a database. I'd like something that's secure, easy to implement, will generate the same thing every time it's passed the same data, and preferably will result in a string that stays a constant length no matter how large the string bei...
I have an offline kiosk computer that will be running a LAMP web server and hosting a form for people to walk up and fill out. The data they submit will be encrypted and stored in a MySQL database (all stored locally on that machine).
The concern is that if the entire box was stolen, someone would potentially be able to get into the cod...
Hi there,
I stumbled upon this piece of code while reading about DES encryption. I wonder what it does do exactly?
I see that it returns either 1 or 0 according to the result of the last if. I also understand that mask is in hexadecimal and equals 128 in decimal (why this particular value?). The for loop starts from 0 until pos%8, why?...
I am using Visual C# built in feature Settings to save some of my program's options.
I also want to store one password, but then it comes public... is it possible to encrypt the password before saving it using this settings method and then decrypt it back?
...
I have a large 'book' that I need to compress, encrypt and also make searchable on the iphone. The app has some requirements that won't allow a simple PDF or EPUB.
I have the book in plain text on my computer, and I am parsing/converting it to XML. I want to compress the file to reduce app purchase download time, and encrypt the app j...
Hi,
I have an Oracle (10.2.0.4) database table with a column which is encrypted by dbms_obfuscation_toolkit.DESEncrypt tool kit.
Some of our data has been messed up by it getting re-encrypted with another key.
I want to do some testing on this data to try and recover it. Therefore, I want to copy the data from our live system and into...
I have a proprietary application that uses an extension to handle cryptography. To encrypt a string I feed it Exponent, Modulus, Base and string as parameters. It returns the encrypted string.
I need to be able to replicate this functionality in a c# application that talks to the proprietary application. I'm unsure where to begin with t...
I'm using gpg to decrypt files sent to me by a vendor. Everything works fine accept for when the content of the encrypted file is empty (the vendor has told me that there is no content in the files in question).
If I try and decrypt one of these files I get:
gpg: can't handle this ambiguous
signature data
Is there any way to che...