Is it possible to use software and hardware encryption together? [closed] - encryption

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Questions concerning problems with code you've written must describe the specific problem — and include valid code to reproduce it — in the question itself. See SSCCE.org for guidance.
Closed 9 years ago.
Improve this question
I'm trying to do Encryption using software and decryption by Hardware(AES-CTR mode algorithm).But facing some issue.software I'm using openssl logic. I tried encryption by sw and Hw with same input but output is differnt :(

Encryption with hardware and software has different output.I guess that is ok. In fact that is how it should be. Normally due to random salting you get different output.
When you do decryption,, decryption should work if both hard ware and software uses same salting mechanism

Related

Can symmetric cryptography be used for providing digital signatures? [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about programming within the scope defined in the help center.
Closed 5 years ago.
Improve this question
I was wondering what the main reason was for symmetric keys not being used in this context?
With a symmetric key, anyone who could check the signature could also forge a signature. For most of the use cases of digital signatures, we want untrusted parties to be able to verify the signature. That requires that the key you use to check that a signature is correct be insufficient to generate a valid signature, and that requires asymmetric cryptography by definition.

Can I attack two rsa encryption knowing they have different encrypted messages and different modulus, yet a common exponent? [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about programming within the scope defined in the help center.
Closed 5 years ago.
Improve this question
So yeah, different modulus(n), same exponent(e), different encrypted messages(C). Can I do anything with that to find the original messages(M) ? Thank you !
Sure. You can factor the modulus, altho for real world RSA keys, that's not gonna be very practical.
More seriously, 99% of all RSA keys use 65537 as the exponent. If a common public exponent were a weakness 99% of all RSA applications would be vulnerable.

how to know which encryption algorithm is used [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about programming within the scope defined in the help center.
Closed 7 years ago.
Improve this question
I have an encrypted code and decrypted code how to know the algorithm?
encrypted code of "A" is "bc1M4j2I4u6VaLpUbAB8Y9kTHBs="
encrypted code of "B" is "rk8oHfWl0P88rWNx921cKbbZU+w="
encrypted code of "C" is "MglsLg7/M9hE7m1nVAes4YKJNX0="
I am making an application which must use that algorithm I have only encrypter software that creates the code but I don't know the algorithm.
How do I know the algorithm?
It's a SHA1 base64 hash algorithm
See this Ruby code
require 'digest/sha1'
puts Digest::SHA1.base64digest 'A'
# bc1M4j2I4u6VaLpUbAB8Y9kTHBs=

what is HttpResponse.OutputStream Property in Asp.net? [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question appears to be off-topic because it lacks sufficient information to diagnose the problem. Describe your problem in more detail or include a minimal example in the question itself.
Closed 9 years ago.
Improve this question
I read Microsoft explanation about what is OutputStream Property! but i really don't understand what is this mean! someone can give me more explanation about this?
The OutputStream is mechanism by which you can transmit content to the client in binary form such as files. This contrasts with the Output property which enables text-based content to be sent to the client.
If you look at the MSDN documentation for both properties, you will see the OutputStream is an implementation of System.IO.Stream which enables you to work with objects as a sequence of bytes, which is usually the most efficient way of moving file content around in .NET. Output is an implementation of System.IO.TextWriter.

Key size of SHA512 hashing algorithm [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Questions must demonstrate a minimal understanding of the problem being solved. Tell us what you've tried to do, why it didn't work, and how it should work. See also: Stack Overflow question checklist
Closed 9 years ago.
Improve this question
What is the key size of the SHA512 hashing algorithm? I know that the final message digest is 512 bits. I would like to know what key size it uses. Thank you very much :)
Hash functions does not use key. It just map any input to one of 2^512 possible values.
What key? There is no key. It's a hashing algorithm, not an encryption algorithm.

Resources