encryption

The necessity of hiding the salt for a hash

At work we have two competing theories for salts. The products I work on use something like a user name or phone number to salt the hash. Essentially something that is different for each user but is readily available to us. The other product randomly generates a salt for each user and changes each time the user changes the password. ...

How secure is 7-zip?

Has its password protection system ever been broken into? Can it be trusted to hold extremely sensitive information? ...

Decrypt PHP encrypted string in C#

I have a string encrypted in PHP that I would like to decrypt in C#. I used the tutorial below to do the encryption, but am having problems decrypting. Can anyone post an example on how to do this? http://www.sanity-free.org/131/triple_des_between_php_and_csharp.html ...

Encryption with C# and Objective-C

What's a good encryption algorithm that will allow me to specify a password to encrypt text? I'm assuming the standard algorithms out there will work cross-platform but I do need the algorithm to work in C# and Objective-C - is anyone familiar with any samples for Objective-C? Thanks ...

Knowing the plaintext, how to discover the encryption scheme used?

I have some char() fields in a DBF table that were left encrypted by a past developer in the project. However, I know the plaintext result of the decryption of several records. How can I determine the function/algorithm/scheme to decrypt the original data? These are some sample fields: For cryptext: b5 01 02 c1 e3 0d 0a plaintext s...

What's the best method to use / store encryption keys in MySQL

I plan on using MySQL and it's built-in encryption functionality to encrypt / decrypt certain columns in certain tables. The concern I have is that I need to store the key somewhere. I could certainly store the key in a file and control the permissions of that file and the permissions of the application that accesses it, but is that en...

public key email encryption

Who has their email fully encrypted ? I would like to encrypt my email but I am not sure how to start. If I use encrypted email and I send an email to someone who does not encrypt his email how can the receiver read the email ? What email client would you recommend to run on a windows systems for encrypted email ? I am using Thunderbir...

How to set up a bidirectionally encrypted email server?

Encrypted email - sounds like a great thing, right? Problem already solved, right? Well... I don't think so and I'm hoping I'm wrong! To understand what I'm asking, please understand what I'm NOT asking: I am not asking how I encrypt and sign messages sent over public networks. This is a bit different. I want to set up a mail server wh...

JDBC Thin layer encryption in Application Servers Data Sources

Hi, I came across an interesting article which shows how we can transparently encrypt jdbc connections using java thin client. http://javasight.wordpress.com/2008/08/29/network-data-encryption-and-integrity-for-thin-jdbc-clients/ However I want to know how this can be achieved for application servers (like oc4j) datasources. ...

removing password for multiple PDF files

so I have a huge collection of PDF files that I need to extract text from. The files are encrypted, but I know the password for them. I'm looking for a way to automate the process of extracting the text. I can manually open the file in Acrobat professional, remove security by typing in the password, and then save as .txt file. But there'...

Opening an RSA private key from Ruby

I think I know how to create custom encrypted RSA keys, but how can I read one encrypted like ssh-keygen does? I know I can do this: OpenSSL::PKey::RSA.new(File.read('private_key')) But then OpenSSL asks me for the passphrase... How can I pass it to OpenSSL as a parameter? And, how can I create one compatible to the ones generated b...

MySQL encrypted columns

Say each row in a table has data pertaining to one particular user. The user has a password to access the system. How do I encrypt a column of data using InnoDB so that no one other than the user who's data it is can read the data ? I was thinking of something like using one of the MySQL encryption functions (say AES) with a key based o...

How can I encrypt a querystring in asp.net?

I need to encrypt and decrypt a querystring in ASP.NET. The querystring might look something like this: http://www.mysite.com/report.aspx?id=12345&year=2008 How do I go about encrypting the entire querystring so that it looks something like the following? http://www.mysite.com/report.aspx?crypt=asldjfaf32as98df8a And th...

What is the most secure hashing algorithm in the .NET framework?

The size of the generated hash and the speed of the algorithm are not important. I'm really only interested in it being the most secure option. I don't want to use any third party libraries either. The version of the .NET framework I'm using if 3.5 if that makes any difference. ...

Sql Server 2005: what data type to use to store passwords hashed by SHA-256 algorithm?

In Sql Server 2005 what data type should be used to store passwords hashed by SHA-256 algorithm? The data is hashed by the application and passed to the database ...

Storing Social Security Numbers

The HR department at the company that I am currently working for has requested that I provide a system for storing employee social security numbers in our company database. The reason for this is to streamline payroll completion, as we use in-house software for employee timesheets but have to integrate with third-party software for our a...

DES Encryption

Are DES Encryption called "One Way Encryption" or "two way Encryption" ? Are there a PHP class or method decrypt the DES Encryption ? thanks ...

Which built-in .NET cryptography algorithm is the most secure?

Hi, Which cryptography algorithm is the most secure that ships with .net? ...

.NET cryptography for licence keys?

Hi, I want to create a license key, which cryptography algorithm would you recommend? Basically the inputs would be: company name major version number date created expirey date has feature1: has feature2: has feature3: e.g. Acme Inc 5.0 20081102 20081102 0 1 0 DUPLICATE http://stackoverflow.com/questions/258721/which-built-in-net-c...

AES encryption, sample code

Hi, How do I go about performing AES encryption on a GUID? On the clients computer we will store a GUID and their public key, and our internal servers will have the private key and their guid. Is this all the necessary inputs to generate the AES encryption? ...