Questions tagged [file-encryption]
The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.
502 questions
1
vote
1
answer
118
views
Exposing size of last chunk in RSA file encryption
So I'm implementing RSA encryption. I'm processing input in chunks of known constant size (depends on modulus) but the last chunk might be smaller so I save its size in plaintext at the end of output ...
1
vote
0
answers
129
views
Is it necessary to encrypt an eMMC that's soldered to the board?
Say you have a machine where the disk (eMMC) is non-removable like the Surface Go. If the UEFI configuration is protected with a long password, USB + network boot is disabled, and your user has a long ...
0
votes
1
answer
114
views
Restrict gpg from decrypting a file encrypted by a subkey which is now expired or revoked [duplicate]
GPG allows file encryption for multiple recipients. I prefer to encrypt files:
Only to recipient subkeys shared with me by the intended recipients, like so:
$ gpg --encrypt --armor --recipient <...
1
vote
1
answer
125
views
What do I need to consider when encrypting multiple (many) files (sometimes in differerent versions with only little difference) with the same key?
I need to continuously encrypt a set of files so that I can send them to a group of people that I trust and who trust among themselves. Thus I would ideally use a symmetric encryption scheme with one ...
3
votes
1
answer
477
views
How to generate a Symmetric Key on the Secure Enclave of iOS devices and use it to encrypt data
I'm working on a secure app that uses the user's master password to derive a symmetric key to encrypt all the user information. I want to add FaceId support now, and the approach I was thinking of was ...
1
vote
1
answer
156
views
Is it possible to use arbitrary file(s) to encrypt another file?
i.e. To allow an unofficial software modification (which is too extensive to distribute as delta/patch files) to be distributed while ensuring the user owns the original software, it would be ...
3
votes
1
answer
242
views
Best Practice for Creating and Accessing an Encrypted Database with a Strong Threat Model
Goal:
I'm seeking feedback on the most secure setup for creating and accessing an encrypted database (KDBX4 format) that minimizes exposure to potential remote attacks. This database will contain ...
1
vote
2
answers
528
views
File encryption using asynchronous keys, having a public key in the field
So for this project I'm looking into encrypting a binary.
My binary should be protected by some means, making sure we know on the other end it was us who packaged/encrypted it.
For this simple task ...
1
vote
2
answers
268
views
How can I compile and run Fortran/C programs on a shared remote server without exposing my code to other root users?
I have access to a big remote server via SSH and I'm a root user on that server. However, there are multiple other root users who also have access to this server. I want to run some Fortran/C programs ...
0
votes
1
answer
98
views
End to end encryption
Can ISPs see file names and file types that are being downloaded from zero knowledge end to end encrypted cloud storage folders like mega.
0
votes
2
answers
334
views
Should you encrypt sensitive files even with FDE?
I'm in the process of trying to make my current laptop setup more secure, especially I'm planning to finally use FDE and enable Secure Boot. However, I'm still unsure on how to handle sensitive, ...
11
votes
4
answers
4k
views
Is my encryption format secure?
I am looking to implement a secure passphrase-encrypted file format for a specific use case. The file format consists storing a randomly generated salt and IV along with the cipher text and a MAC to ...
0
votes
0
answers
140
views
NTRU - How is the master key and session key generated?
I am learning the PKC topics and would like to understand about the master and session key generation process regarding NTRU.
Let's make it a scenario, if a user wants to register during the ...
1
vote
1
answer
2k
views
GPG can't decrypt my data because of an invalid packet
I have an encrypted data containig some of my data that I am unable to decrypt. It is archived with tar, compressed with gzip and encrypted with gnupg. Today I tried to decrypt it with gpg and it ...
0
votes
0
answers
164
views
Why doesn't file/folder encryption work the way I imagine it should? Can I have the UX I want? Tell me what's wrong with this idea
I have been looking around at various encryption schemes, and I haven't found anything exactly like what I want in terms of user experience.
If what I want isn't a thing, I assume it's been thought of,...