Skip to main content

Questions tagged [encryption]

For questions about encryption and decryption of data, which is the process of encoding data in such a way that adversaries cannot read or tamper with it. Technical questions about encryption (e.g. how does algorithm X work?) are off-topic but might be in scope for our sister sites about Information Security and/or Cryptography.

Filter by
Sorted by
Tagged with
0 votes
1 answer
111 views

I'm building a Laravel-based web application that functions as a personal online photo archive. Each user uploads and manages their own private collection of images. These images are encrypted at rest ...
TimoFran's user avatar
0 votes
1 answer
263 views

In broad strokes, here is the problem at hand with its unusual combination of constrains, and the solution I've come up with. While this question does involve cryptography, it isn't related to the ...
Jacob Jewett's user avatar
1 vote
2 answers
277 views

I'm in the very conceptual phase of designing an open source password manager that provides distributed Vaults that can be simultaneously accessed and managed from multiple devices with the promise of ...
Nick Williams's user avatar
1 vote
2 answers
433 views

We're building an application that needs to log into a website using built-in credentials. It's not optimal to say the least, but we're stuck with "knowing" the username and password ...
glades's user avatar
  • 493
1 vote
1 answer
402 views

I'm not sure if I misunderstood these codes. First Alice generate her keypair and sent the public key to Bob. Then Bob uses the parameter in the public key to generate his keypair and sent the public ...
Kimi Chiu's user avatar
  • 113
1 vote
1 answer
132 views

Does it make sense to implement TLS encryption for a service which will always be behind a reverse proxy? The reverse proxy will be able to handle encryption to users directly. +--------------------...
quazgar's user avatar
  • 459
0 votes
2 answers
675 views

Suppose today I'm designing a new application that will employ asymmetric cryptography to allow users to securely exchange data with one another. As far as I can tell there are no quantum-safe ...
Peter Moore's user avatar
5 votes
5 answers
6k views

I am developing a .NET Windows application and I need to make requests to a SQL Server instance. How do I secure the authentication data in my code in case someone decompiles my application? I know ...
Motti's user avatar
  • 85
0 votes
0 answers
82 views

I have an application that employs "zero knowledge" data security, where even with full backend access to our application, customer data cannot be read without knowing their individual ...
Peter Moore's user avatar
0 votes
2 answers
92 views

Assume an application developed in a PaaS public cloud environment. The application stores and processes some kind of sensitive data. Encryption-at-rest seems clearly described already, and the option ...
MrSpence's user avatar
1 vote
1 answer
150 views

I understand why Tor needs many nodes in each relay, although in the case of connecting a hidden server, the packet is encrypted end to end. So why then must there be multiple layers of encryption on ...
user708873's user avatar
3 votes
4 answers
3k views

I am developing a website and I would like to allow users to use XMPP for live chat. I would like users to have the option use an existing XMPP account if they wish and store their XMPP username and ...
Leo Grün's user avatar
0 votes
0 answers
128 views

I'm creating an authorisation service, which does signing using a key. For local development I was randomly generating a key on application start-up. Now I'm deploying to the cloud (currently going ...
Tobi Akinyemi's user avatar
0 votes
3 answers
172 views

Is there a solution for the following problem? We have a function f(x,y) where the inputs are secret an cannot be known by anyone besides the party that submitted them. The output of f is public and ...
Jakob's user avatar
  • 9
-2 votes
1 answer
92 views

A question that I have been wondering for quite some time now, is how do two devices send encrypted data over the internet know the encryption keys to encrypt and decrypt the data, or more importantly ...
TheAdmin's user avatar
3 votes
1 answer
188 views

I'd like to build a simple privnote-type clone for fun. The idea is this: User A writes a note in their browser, browser encrypts it client-side Server saves the pre-encrypted note without knowing ...
McDerp's user avatar
  • 75
-5 votes
2 answers
350 views

We have developed an algorithm that processes some data at runtime and is slight efficient in terms of time and computing compared with other solutions out there. Though we sure anyone can develop a ...
software_dev's user avatar
0 votes
1 answer
579 views

as the title suggest, I need to handle the tenant files in a multi-tenant saas app. fairly common scenario I believe and should have been solved by the gurus already. right now the app is in infancy ...
Waku-2's user avatar
  • 143
1 vote
1 answer
113 views

Let me start by saying that I'm not questioning the utility of encrypting EBS volumes, nor asking how it works. I'm just wondering what specifically encrypting EBS volumes is protecting against? For ...
Andrew Zick's user avatar
1 vote
1 answer
168 views

So i got a few xml files that need to be encrypted and it works, no problems here. Now since the latest update of the CodeAnalyzers i got a new warning ( CA5401 ) that tells me, that it is a bad idea ...
Otterprinz's user avatar
1 vote
0 answers
224 views

I'm planning to setup a hybrid encryption procedure in my app. So basically i did encryption for data send from client to server using this method, now i'm confused on how to encrypt data send from ...
Navneet Krishna's user avatar
0 votes
2 answers
141 views

I have a web application that allows user view our data that front-end in JavaScript fetches the data via a Restful request to back-end, then render it in the application. The size of each data can ...
eth4io's user avatar
  • 165
-3 votes
1 answer
118 views

My question is simple: What steps should you take to protect research from the vast amount of spyware or insecure applications on a given device? Background: I do research into developing new models ...
poodledot's user avatar
-2 votes
1 answer
220 views

I am making an online poker server in NodeJS. Currently, the state of the game is being sent to each client. So using debugging tools a client can see all the other player's card IDs. I would like to ...
Moscoso's user avatar
  • 27
4 votes
1 answer
557 views

How can personal information that needs to be retrieved at a later date be stored securely in a database? For instance when companies store social security numbers and use them for taxation purposes. ...
Jim's user avatar
  • 151
2 votes
4 answers
6k views

I'm using the google maps API, which has a secret key that I need to use on the client side. I was thinking of some alternatives to store it safely. One of them is storing it in my flask database. ...
SumakuTension's user avatar
1 vote
1 answer
302 views

A PHP based webshop running on a shared hosting stores libsodium encrypted personal data in it's MySQL database. To let users have access to their own data, a design very similar to the one discussed ...
goToAndPlay's user avatar
-1 votes
1 answer
377 views

The title maybe it's a little bit confusing but I am certain that what I want to achieve is a common pattern, even if I didn't found anything on internet. I'm developing a web app that store ...
damianobellucci's user avatar
0 votes
1 answer
561 views

I have a web app that connects to a MYSQL database which has some encrypted data in it. The encrypted data is encrypted using the the mysql AES_ENCRYPT function and a key. Now, this key has been ...
Corey's user avatar
  • 9
0 votes
2 answers
320 views

MongoDB recently announced their new field-level-encryption method for helping tackle DB breaches. (https://www.wired.com/story/field-level-encryption-databases-mongobd/) In other articles it is ...
JᴀʏMᴇᴇ's user avatar
2 votes
2 answers
4k views

So I am trying to mix my software skills with my electronics skills, and I want to try something a bit different. Basically: buy a walkie talkie, take it apart, remove the microphone and put a rasp pi ...
bv_Martn's user avatar
2 votes
1 answer
132 views

I know very little about encryption, so I figured I'd ask the internet if it's possible to do the following (and if so, what kind of algorithm should I be looking at): Write some code that saves data ...
Zoltán Király's user avatar
0 votes
1 answer
110 views

How can i realize password authenticated key retrieval? I found some description of PAKR: A PAKR (Password-Authenticated Key Retrieval) protocol and its multi-server system allow one party (say, ...
Zoe's user avatar
  • 11
0 votes
1 answer
110 views

I didn't find any helpful questions to this topic, so I am just asking a new question, correct me if I am wrong. I am looking to build my own little smarthome stuff, e.g. a doorlock with an rfid ...
Shadow's user avatar
  • 3
3 votes
3 answers
2k views

I'm rather new at programming so I'm still getting a grip on things. I'm creating an offline login system in C# that will have the ability add/remove users. The computer will not be connected to the ...
user avatar
0 votes
1 answer
80 views

I would like to ask you a questions that arose these days with GDPR new rules. What I have is a payments service which use BrainTree to make the payments. In my side I store some information ...
pik4's user avatar
  • 385
1 vote
2 answers
252 views

I'm writing a slack bot that interfaces end users with an API. That API only method of identification is the raw "login:password" encoded to base64 (it doesn't answer back a token) ... Currently in ...
Eagle1's user avatar
  • 113
0 votes
2 answers
1k views

I'm currently working on a desktop application in Java (using JavaFX). This application stores some user information, parts of which are sensitive. For example, if the user configures a proxy, it ...
Mathieu THEBAUD's user avatar
2 votes
2 answers
5k views

I'm working in a Electronic Funds Transfer (EFT) system and need be very careful with sensitive data like credit card numbers. We need this information do mount the ISO 8583 data before sending to ...
Rodrigo Menezes's user avatar
0 votes
1 answer
151 views

I have previously implement Client Side Data Encryption using Azure Key Vault using the following approach: Encryption Approach: Every record that needs to be encrypted gets a Content Encryption Key (...
Anup Marwadi's user avatar
2 votes
1 answer
1k views

I have a client side android app which needs to send an encrypted string to a server implemented in PHP. For this I have chosen an asymmetric algorithm (RSA). Should I: Save a public key in client ...
Navneet Krishna's user avatar
7 votes
3 answers
9k views

I am developing software in Window 10 and Visual Studio in C++. I would like to restrict the use of the software to a set of computers, by implementing a license control. My thought is to query a ...
Steve's user avatar
  • 235
0 votes
1 answer
159 views

Example: I'm in a coffee shop in Maine, using a VPN whose physical location is in Berlin. I know that my packets between Maine and Berlin are encrypted, so someone snooping on that coffee shop's ...
tscizzle's user avatar
  • 313
-2 votes
1 answer
101 views

I'm building for a client's service that allows developers to build client side forms, similar to formspree.io, etc. Basically, developers can set an action to their HTML forms which send the POST ...
Muhambi's user avatar
  • 63
1 vote
1 answer
556 views

I'm going to encrypt the following data (server side): email, IP, username { *IP*: { email: *email at this IP* username: *username of email IP* } *IP2*: { email: ...
Tobi's user avatar
  • 220
1 vote
2 answers
2k views

I'm working on a Web App where the data is quite sensitive and is required to be encrypted before it is stored in the database. Now there are two ways through which I can achieve this: Encrypt data ...
Rida Iftikhar's user avatar
4 votes
5 answers
3k views

I have a login page, where user logs in via his mobile number, He gets an OTP send via backend server, once he enters a One-Time Passcode (OTP), we hit an API like this: https://backend.com/api/login?...
Saurabh's user avatar
  • 151
-1 votes
1 answer
228 views

So one day i was reading about RSA and over there it was written that we can secure the data using the public key. So as an idea can I secure the data on the client itself before sending it to the ...
Nilesh's user avatar
  • 51
2 votes
0 answers
384 views

Let's say I am using a RSA keypair to encrypt and decrypt a large amount of traffic over a public network. Assume all traffic is padded and the key is 2048 bits, how often would you recommend renewing ...
Rumham's user avatar
  • 39
4 votes
3 answers
2k views

I know I should encrypt the password whenever I save passwords for security. But I don't know how should I encrypt password that when I save for autologin. If the password was just for checking user,...
maxswjeon's user avatar