secret-key

Keeping a secret key secret with Amazon Web Services

I'm playing around with using amazon web services in my personal project. I've grabbed their AWS SDK for .NET and I'm using that, but I'm a little confused. Access to the web service (in this case, SimpleDB, though I don't think that's really material to the question) is authorized via a private/public key pair. The AWS SDK for .NET A...

app engine secret key for iphone access

Hi, How can i make sure only my iphone app is allowed to use my app engine application for sending and receiving data? I probably have to use a secret key, but i don't know how. Can i just use post/get to send my static key over https? Or do i need to use some dynamic secret key algorithm? Any help would be appreciated! Bjorn ...

javascript hide code for secret keys etc

I am using the Ribbit javascript api and trying to figure out how not to show the secrety key and all those application settings which are set in a code block using a Ribit.init function: Ribbit.init("consumerKey"); ...

What one-time-password devices are compatible with mod_authn_otp?

mod_authn_otp is an Apache web server module for two-factor authentication using one-time passwords (OTP) generated via the HOTP/OATH algorithm defined in RFC 4226. The developer's has listed only one compatible device (the Authenex's A-Key 3600) on their website. If a device is fully compliant with the standard, and it allows you to r...

Storing secret keys on iPhone source and project resources

Is storing secret keys (internal use passwords and such) on iPhone source code and project resources (such as plist files) secure? Obviously nothing is 100% secure, but can this information be extracted easily from an installed app? How do you recommend storing these keys to use them in the source code? Just in case, this question is...

BAD_UID error while exporting key in CryptoAPI

Hi all, I am writing a test application for Microsoft CryptoAPI. I want to export the secret key of one party using the public key of the second party, and then import that secret key as the second party's secret key (this sets up a shared secret key for communication). Here is my code: if(!CryptExportKey(encryptT->hSymKey, decryptT->hP...

For RSA, how do i calculate the secret exponent?

For RSA, how do i calculate the secret exponent? Given p and q the two primes, and phi=(p-1)(q-1), and the public exponent (0x10001), how do i get the secret exponent 'd' ? I've read that i have to do: d = e-1 mod phi using modular inversion and the euclidean equation but i cannot understand how the above formula maps to either the a-1...

OAuth consumer keys in plugins

What is the best way to handle consumer secret keys for OAuth in plugins that will be distributed with/as source code (e.g. Wordpress plugins that access Delicious or Twitter)? I know OAuth is not designed with this in mind, and there are proposals to solve it, but what is the best practice at this moment? There seem to be two approache...