Skip to main content
The 2024 Developer Survey results are live! See the results

Questions tagged [encryption]

Encryption is the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.

2 votes
1 answer
80 views

How can I ensure nonrepeating IV with AES/GCM encryption?

I'm trying to encrypt files before storing them on my hard drive using AES/GCM encryption in Java. I currently have the following code: byte[] iv = new byte[GCM_IV_LENGTH]; SecureRandom random = new ...
khh's user avatar
  • 23
25 votes
6 answers
6k views

Why is much harder to encrypt emails, compared to web pages?

We are all used to reading web pages protected by HTTPS. It has, as far as I (as a user of a browser) can perceive, zero cost. Contrarily, encrypting an email is inconvenient to both sender and ...
Peter Bill's user avatar
1 vote
0 answers
14 views

Restoring lost encrypted partition [migrated]

I accidantally formatted the entire hard disk (quick format into NTFS) it contains multiple partitions of different filesystem ext4 encrypted with luks (whole partition encryption) ext4 no encrypted ...
username's user avatar
1 vote
1 answer
110 views

How do I encrypt and store user data?

I'm building a PHP website using MySQL as a database for an event managing system. I want to store user data so when they sign up for an event they can just verify information and submit, rather than ...
inf_loop's user avatar
18 votes
7 answers
6k views

ELI5: If SSL encrypts traffic, why does it expire?

SSL, nowadays TLS, encrypts traffic between the server and client. However, the certificate is only valid for a certain period of time until its expiration. What I don't understand is, why does TLS ...
MaSc. H.'s user avatar
  • 199
2 votes
1 answer
68 views

Is local password recovery for each device a viable security approach?

I'm developing a multi-platform application using Flutter, which involves sensitive user data and requires both online and offline accessibility. To enhance security and usability, I am considering ...
george orwell's user avatar
4 votes
2 answers
233 views

How safe are my app's keys inside the TPM against other apps trying to impersonate mine?

This is a follow-up of these two questions about using the TPM to store application's keys. While both have great answers, there is a specific aspect I am missing: How safe are the keys inside the TPM ...
mist's user avatar
  • 113
2 votes
0 answers
67 views

Searchable encryption for phone numbers

I have a table in Postgres that stores phone numbers. Since phone numbers are considered PII, I cannot store them as plaintext. For other PII fields, I use AES-256-CBC. However, the requirements are ...
Stefan van den Akker's user avatar
0 votes
0 answers
34 views

can non-rotatable secrets be stored in ciphertext form in a DB/file/etc.?

We have a service running on AWS. This service uses secrets such as API keys of third party services (in other words: secrets which do not rotate automatically). These secrets are stored in AWS ...
Itay Maman's user avatar
0 votes
1 answer
119 views

Can we catch signals from a cellphone using AI to interpret the encrypted data?

Would it be possible for someone to steal EM waves from our mobile devices to listen to our conversations or get our OTP? Whatever encryptions they have they are just EM waves. Based on the patterns ...
Newtron Malayalam's user avatar
6 votes
2 answers
160 views

Use of TPM to encrypt data of my application in practice

I am not very familiar with TPMs, but from what I can tell their main benefit for the user is to make the system as a whole more secure, if you take the appropriate measures, e.g. by checking the boot ...
mist's user avatar
  • 113
0 votes
0 answers
7 views

Implementing end to end encryption (react js , laravel) [migrated]

I need to implement end to end encryption between front (reactjs) and back (laravel). What I try to do is encrypt data in front using package cryptojs, send it using axios to backend, in the backend I ...
user26307664's user avatar
2 votes
1 answer
71 views

Are there any motherboards / UEFI that support hardware encryption on SED?

I found that Thinkpads have hdd password support, which in terms uses some bizarre password hashing and ends up with 90 bits of entropy, which is again used as ATA security password to SED, which in ...
mmja's user avatar
  • 93
1 vote
0 answers
59 views

OpenSSH 9.6p1: What is the best key type for the ssh-keygen command through the -t option? [duplicate]

The ssh-keygen command to generate the pair of keys files can use the -t option. According to Ubuntu Noble's man ssh-keygen for the mentioned option, it indicates: -t dsa | ecdsa | ecdsa-sk | ed25519 |...
Manuel Jordan's user avatar
0 votes
1 answer
38 views

Assure Deterministic Hashing/Encryption Process can be Replicated if Rebuilt

May I have some guidance for a project I am working on? These are the requirements: A Dataset needs to be submitted in a .csv format, delimited by '|' The Dataset needs to be submitted periodically (...
Clifford Piehl's user avatar

15 30 50 per page
1
2 3 4 5
394