Questions tagged [encryption]
Encryption is the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.
5,909
questions
2
votes
1
answer
80
views
How can I ensure nonrepeating IV with AES/GCM encryption?
I'm trying to encrypt files before storing them on my hard drive using AES/GCM encryption in Java. I currently have the following code:
byte[] iv = new byte[GCM_IV_LENGTH];
SecureRandom random = new ...
25
votes
6
answers
6k
views
Why is much harder to encrypt emails, compared to web pages?
We are all used to reading web pages protected by HTTPS. It has, as far as I (as a user of a browser) can perceive, zero cost. Contrarily, encrypting an email is inconvenient to both sender and ...
1
vote
0
answers
14
views
Restoring lost encrypted partition [migrated]
I accidantally formatted the entire hard disk (quick format into NTFS)
it contains multiple partitions of different filesystem
ext4 encrypted with luks (whole partition encryption)
ext4 no encrypted
...
1
vote
1
answer
110
views
How do I encrypt and store user data?
I'm building a PHP website using MySQL as a database for an event managing system. I want to store user data so when they sign up for an event they can just verify information and submit, rather than ...
18
votes
7
answers
6k
views
ELI5: If SSL encrypts traffic, why does it expire?
SSL, nowadays TLS, encrypts traffic between the server and client. However, the certificate is only valid for a certain period of time until its expiration.
What I don't understand is, why does TLS ...
2
votes
1
answer
68
views
Is local password recovery for each device a viable security approach?
I'm developing a multi-platform application using Flutter, which involves sensitive user data and requires both online and offline accessibility. To enhance security and usability, I am considering ...
4
votes
2
answers
233
views
How safe are my app's keys inside the TPM against other apps trying to impersonate mine?
This is a follow-up of these two questions about using the TPM to store application's keys. While both have great answers, there is a specific aspect I am missing:
How safe are the keys inside the TPM ...
2
votes
0
answers
67
views
Searchable encryption for phone numbers
I have a table in Postgres that stores phone numbers. Since phone
numbers are considered PII, I cannot store them as plaintext.
For other PII fields, I use AES-256-CBC. However, the requirements are ...
0
votes
0
answers
34
views
can non-rotatable secrets be stored in ciphertext form in a DB/file/etc.?
We have a service running on AWS. This service uses secrets such as API keys of third party services (in other words: secrets which do not rotate automatically). These secrets are stored in AWS ...
0
votes
1
answer
119
views
Can we catch signals from a cellphone using AI to interpret the encrypted data?
Would it be possible for someone to steal EM waves from our mobile devices to listen to our conversations or get our OTP?
Whatever encryptions they have they are just EM waves. Based on the patterns ...
6
votes
2
answers
160
views
Use of TPM to encrypt data of my application in practice
I am not very familiar with TPMs, but from what I can tell their main benefit for the user is to make the system as a whole more secure, if you take the appropriate measures, e.g. by checking the boot ...
0
votes
0
answers
7
views
Implementing end to end encryption (react js , laravel) [migrated]
I need to implement end to end encryption between front (reactjs) and back (laravel). What I try to do is encrypt data in front using package cryptojs, send it using axios to backend, in the backend I ...
2
votes
1
answer
71
views
Are there any motherboards / UEFI that support hardware encryption on SED?
I found that Thinkpads have hdd password support, which in terms uses some bizarre password hashing and ends up with 90 bits of entropy, which is again used as ATA security password to SED, which in ...
1
vote
0
answers
59
views
OpenSSH 9.6p1: What is the best key type for the ssh-keygen command through the -t option? [duplicate]
The ssh-keygen command to generate the pair of keys files can use the -t option. According to Ubuntu Noble's man ssh-keygen for the mentioned option, it indicates:
-t dsa | ecdsa | ecdsa-sk | ed25519 |...
0
votes
1
answer
38
views
Assure Deterministic Hashing/Encryption Process can be Replicated if Rebuilt
May I have some guidance for a project I am working on?
These are the requirements:
A Dataset needs to be submitted in a .csv format, delimited by '|'
The Dataset needs to be submitted periodically (...