Skip to main content

Questions tagged [file-encryption]

The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.

1 vote
1 answer
118 views

Exposing size of last chunk in RSA file encryption

So I'm implementing RSA encryption. I'm processing input in chunks of known constant size (depends on modulus) but the last chunk might be smaller so I save its size in plaintext at the end of output ...
Maq's user avatar
  • 113
1 vote
0 answers
129 views

Is it necessary to encrypt an eMMC that's soldered to the board?

Say you have a machine where the disk (eMMC) is non-removable like the Surface Go. If the UEFI configuration is protected with a long password, USB + network boot is disabled, and your user has a long ...
Jan Sommer's user avatar
0 votes
1 answer
114 views

Restrict gpg from decrypting a file encrypted by a subkey which is now expired or revoked [duplicate]

GPG allows file encryption for multiple recipients. I prefer to encrypt files: Only to recipient subkeys shared with me by the intended recipients, like so: $ gpg --encrypt --armor --recipient <...
Suhas Srivastava's user avatar
1 vote
1 answer
125 views

What do I need to consider when encrypting multiple (many) files (sometimes in differerent versions with only little difference) with the same key?

I need to continuously encrypt a set of files so that I can send them to a group of people that I trust and who trust among themselves. Thus I would ideally use a symmetric encryption scheme with one ...
René Nyffenegger's user avatar
3 votes
1 answer
477 views

How to generate a Symmetric Key on the Secure Enclave of iOS devices and use it to encrypt data

I'm working on a secure app that uses the user's master password to derive a symmetric key to encrypt all the user information. I want to add FaceId support now, and the approach I was thinking of was ...
Enric's user avatar
  • 133
1 vote
1 answer
156 views

Is it possible to use arbitrary file(s) to encrypt another file?

i.e. To allow an unofficial software modification (which is too extensive to distribute as delta/patch files) to be distributed while ensuring the user owns the original software, it would be ...
Hiccup's user avatar
  • 119
3 votes
1 answer
242 views

Best Practice for Creating and Accessing an Encrypted Database with a Strong Threat Model

Goal: I'm seeking feedback on the most secure setup for creating and accessing an encrypted database (KDBX4 format) that minimizes exposure to potential remote attacks. This database will contain ...
arderstt's user avatar
1 vote
2 answers
528 views

File encryption using asynchronous keys, having a public key in the field

So for this project I'm looking into encrypting a binary. My binary should be protected by some means, making sure we know on the other end it was us who packaged/encrypted it. For this simple task ...
Foitn's user avatar
  • 121
1 vote
2 answers
268 views

How can I compile and run Fortran/C programs on a shared remote server without exposing my code to other root users?

I have access to a big remote server via SSH and I'm a root user on that server. However, there are multiple other root users who also have access to this server. I want to run some Fortran/C programs ...
Akhil Akkapelli's user avatar
0 votes
1 answer
98 views

End to end encryption

Can ISPs see file names and file types that are being downloaded from zero knowledge end to end encrypted cloud storage folders like mega.
Robert Bak's user avatar
0 votes
2 answers
334 views

Should you encrypt sensitive files even with FDE?

I'm in the process of trying to make my current laptop setup more secure, especially I'm planning to finally use FDE and enable Secure Boot. However, I'm still unsure on how to handle sensitive, ...
zhekemist's user avatar
11 votes
4 answers
4k views

Is my encryption format secure?

I am looking to implement a secure passphrase-encrypted file format for a specific use case. The file format consists storing a randomly generated salt and IV along with the cipher text and a MAC to ...
dylanweber's user avatar
0 votes
0 answers
140 views

NTRU - How is the master key and session key generated?

I am learning the PKC topics and would like to understand about the master and session key generation process regarding NTRU. Let's make it a scenario, if a user wants to register during the ...
Chris Lo's user avatar
1 vote
1 answer
2k views

GPG can't decrypt my data because of an invalid packet

I have an encrypted data containig some of my data that I am unable to decrypt. It is archived with tar, compressed with gzip and encrypted with gnupg. Today I tried to decrypt it with gpg and it ...
Nicolas Dumitru's user avatar
0 votes
0 answers
164 views

Why doesn't file/folder encryption work the way I imagine it should? Can I have the UX I want? Tell me what's wrong with this idea

I have been looking around at various encryption schemes, and I haven't found anything exactly like what I want in terms of user experience. If what I want isn't a thing, I assume it's been thought of,...
Stonecraft's user avatar

15 30 50 per page
1
2 3 4 5
34