28
votes
Implementation of diceware: do I have to simulate dice roll?
The reason Diceware advocates using dice to select a password is that it ensures the password the user gets is generated randomly. So no, as long as you are certain your program is selecting the ...
18
votes
Accepted
Why is asymmetric encryption less efficient than symmetric encryption?
This depends on the algorithm. Especially with asymmetric cryptography, the speeds vary wildly. You may want to check out eBACS for more detailed and machine-independent benchmarking of various crypto ...
15
votes
Accepted
Do all Authenticator Apps use the same algorithm?
these apps are use the same algorithm which is a generic algorithm not an application developer's algorithm. Am I right ?
Yes.
There are two commonly used protocol for authenticator apps:
HOTP (HMAC-...
14
votes
Implementation of diceware: do I have to simulate dice roll?
Yes, this is perfectly fine to do. With a good PRNG, each element will have exactly the same odds of being chosen, if you do the limitation (1 to n) correctly. (I have personally done a diceware ...
13
votes
Accepted
Is MD5 hashing possible by divide and conquer algorithm
The classical solution is using the Merkle-Tree. To use the Merkle-Tree for uploading, the client forms the Merkle-Tree and calculates the hashes, and sends you the root hash in advance in a secure ...
11
votes
Accepted
Asymmetric encryption of very small messages
Probably the best you can do is to use Curve25519 to derive a secret and then use the secret to derive a key and IV which are used to encrypt the data symmetrically with an AEAD. That would expand ...
9
votes
Accepted
Drawbacks of ML in cyber security?
You are asking a couple different questions at once: how is ML implemented by a certain vendor, and how could it be implemented to be effective. Let's focus on the later.
I have designed such ...
8
votes
Accepted
Is there such a cryptographic algorithm?
Standard cryptographic algorithms will do this. If you use the wrong key in a standard symmetric cipher (like AES) it will decrypt the data into a random series of bytes that will look like ...
7
votes
Accepted
Is this Python program secure?
Short answer: No, it's not secure.
Anything based on substitution ciphers will be vulnerable to frequency analysis. I'm not totally clear what you mean by this:
[keygen:] build a dict char -> list ...
6
votes
Is it more secure encrypting 3 times with GPG?
You may be surprised to learn the answer is "you are probably less secure."
Security isn't simply asking "can someone else hack my crypto?" Security is a big picture for protecting yourself and your ...
5
votes
Is there a difference between encryption keys and encryption certificates?
Certificates are used to create a Public Key Infrastructure (PKI). Generally the X.509 form of certificates are used, in which case the PKI is called PKIX, after the standard. The private keys within ...
5
votes
Which algorithm is safest if we exclude AES, Twofish, Serpent and Whirpool?
I won't say that it's overkill, but I will say that I think you need to get a better understanding of cryptography before attempting to secure your data for 100+ years.
Encrypting in a cascade is ...
5
votes
Accepted
Can a hashing function be implemented insecurely?
Unlikely
First of all, the implementation of a hashing function could be faulty in terms of software engineering. That doesn't mean the implementation is insecure per se, but means that you are not ...
5
votes
Accepted
Is it possible to brute-force the original message of SHA-256 given the size of original string?
Given the original length L of the string, you could consider that the effort to retrieve it is 92 power L (92 is 26 lowercase + 26 uppercase + 10 digits + 30 punctuation) instead of 2 power 256.
So ...
5
votes
Is there a well-defined algorithm to find preimages in MD5?
You won't be able to find a preimage for MD5.
The best preimage attack against MD5 has a complexity of 2123.4 and requires 245 × 11 words of memory. This is faster than brute force, which has a ...
4
votes
How to decrypt a text with substitution cipher?
You should be able to crack it with some simple statistics analysis, using common patterns of english language. For example the word 'the' or 'is' will appear frequently and same word would appear the ...
4
votes
Accepted
How to interpret security impact of "Server Signature Algorithms" (sslscan)
Here is the code: https://github.com/rbsec/sslscan/blob/master/sslscan.c#L5584
The software has an array of values of TLS "SignatureAndHashAlgorithm", 2 byte values which before TLS 1.3 used ...
4
votes
Always leaking ext4 superblock
As a practical matter, every encrypted data container is going to have some sort of unencrypted (but possibly authenticated) metadata to help identify it and extract important information, like ...
3
votes
What is the standard practice to maintain a password for different websites?
As @josef already mentioned, the best solution is to use a password manager and generate a random password for every account.
Here are a few best practices regarding the use of e.g. KeePass:
Make ...
3
votes
What is the standard practice to maintain a password for different websites?
There are different mitigations suggested like for example PasswordCard or some hints how to extend your password with the site name or even hash tools.
But the only best practice is to use a ...
3
votes
Encryption and Hash algorithms explanation
Encryption describes a method to encrypt and decrypt data. In other words, you can get the original data back, if you know the key.
Encryption can further be divided into symmetric encryption and ...
3
votes
Accepted
Is there a standard checksum for verifying multipart key fragments?
There is no standard algorithm for key verification*, but there are standard checksums.
Assuming verification is done to detect simple mistakes when retrieving or submitting the key, any reliable ...
3
votes
Do all Authenticator Apps use the same algorithm?
All of the apps you listed share an algorithm. This allows them to be compatible and largely interchangeable.
However, there are other schemes that appear nearly identical from a user standpoint but ...
3
votes
Implementation of diceware: do I have to simulate dice roll?
Ajedi32's answer is a great one. I wanted to emphasize one detail which may help answer your question better. The key to secure password generation is to ensure that your password is unpredictable. ...
3
votes
Accepted
Promotional code based on numerical value
no additional field in the database - through algorithm the promotional code can be decoded back to userid
While this would usually be solved through an additional table with cross references, ...
3
votes
What is the most crypto-resistive algorithm to safely send information?
There is not a known answer to this. There are algorithms that are viewed as secure and algorithms that aren't - "secure" algorithms may contain flaws but to date they are not publicly known. Schneier ...
3
votes
Rearranging hash adds no security?
First of all, based on Kerckhoffs's principle, you must assume that an attacker knows the algorithm you used to hash the passwords, so doing things differently than others won't make you secure by ...
3
votes
Using a home-brewed hash for passwords for a insignificant website
This might make sense under the assumption that an attacker doesn't know how your algorithm works. Unfortunately that isn't a realistic assumption.
Sometimes the attacker is an insider (in fact, ...
3
votes
How bad would a Hash algorithm leak would be?
Algorithms used by web sites for salting and hashing passwords are generally not secret. For example, the algorithm used by Argon2 (which is a modern function for salting and hashing passwords) can ...
2
votes
Accepted
Hide algorithm and variables
You are looking for something called fully homomorphic encryption.
The gist of it is that party A can compute stuff using your variables without knowing your variables (mind blown, I know).
It would ...
Only top scored, non community-wiki answers of a minimum length are eligible
Related Tags
algorithm × 164encryption × 55
hash × 47
cryptography × 23
passwords × 18
aes × 10
authentication × 7
decryption × 7
rsa × 6
php × 5
password-management × 5
brute-force × 5
asymmetric × 5
key × 5
digital-signature × 4
file-encryption × 4
.net × 4
salt × 4
md5 × 4
bcrypt × 4
cipher-selection × 4
sha256 × 4
tls × 3
password-cracking × 3
databases × 3