Questions tagged [algorithm]
Algorithm is a set of step-by-step operations to be performed including calculations, data processing, and automated reasoning.
164 questions
0
votes
0
answers
50
views
How to determine what was done to the string before it was hashed? [duplicate]
I know the plaintext of this hash is no input
86E80EBA5AF396507BCE69ADE203A489F8BB2319
and this hash is cuttingsteel1952: B493394637ED3C2E25D84F71AF2F0BA0C0B55070
How do I identify the hash algorithm ...
0
votes
2
answers
244
views
How bad would a Hash algorithm leak would be?
Context:
When the Twitch whole code repository was leaked, it created multiple discussions on social medias.
And one day I was on Reddit and said that the leak of the hashing algorithm and the salt ...
1
vote
0
answers
114
views
Hash function the other way around [closed]
Is there anything that works like the opposite of a hash algorithm?
Today we know many hash algorithms, which take an input, perform some math on it, and output a value which is different than the ...
0
votes
1
answer
2k
views
Cipher Suites settings wrong order?
I'm trying to setup a custom order of TLS cipher suites according to this Microsoft list, on Windows Server 2022 but the outcome is not the one that I was expecting.
After using the powershell to ...
2
votes
3
answers
471
views
Best way to bruteforce a list of hashed integers?
I have a list of hashes, I need to find the original value of any of them.
So far I know that the hashes are only numbers of length 30. The format should be something like ...
2
votes
1
answer
414
views
Always leaking ext4 superblock
An encrypted ext4 container will always leak the superblock information.
So encrypting an unencrypted metadata file system like ext4 is inherently vulnerable because it instaleaks?
Shouldn't it then ...
5
votes
1
answer
997
views
Asymmetric encryption of very small messages
I am working on an application which has a requirement to send very small messages (<64 bits), asynchronously, and using secure asymmetric encryption. We've experimented with simple RSA + OAEP, and ...
0
votes
1
answer
1k
views
Encryption Algorithm With Separate One-Way (Hashing) And Two-Way (Decryption) Keys
In cryptography, generally we have two ways of handling sensitive information.
We can use one-way encryption such as hashing. This is useful when we never need to retrieve it again. In this case, we ...
-1
votes
1
answer
200
views
Security technologies that implements security through "organic-like" obscurity? [closed]
Are there any advanced security technologies, for example, establishing a secured connection, which first require authentication based on security through organic-like changing obscurity of secrecy?
I'...
1
vote
0
answers
129
views
How to prevent dos(denial of service) attack? [closed]
Hi is there any solid algorithm or solution where I can refer to for preventing dos (denial of service)attack on my apache server ? I did the dos attack using slowloris in ubuntu and switchblade in ...
-1
votes
1
answer
160
views
Is there any secure method to have recoverable passwords?
I have a local application that normally authenticates against a remote Active Directory server. If the local host loses network connectivity, a special local account becomes available for login. ...
1
vote
1
answer
3k
views
Certificate Signed Using Weak Hashing Algorithm impact on a workstation
I did a vulnerability scan on some of our company workstations. These are workstations used by employees (dev, HR, accounting, etc.) to do their job.
One of the common result I found is SSL/TLS ...
3
votes
2
answers
7k
views
How to interpret security impact of "Server Signature Algorithms" (sslscan)
I'm looking at the results of an sslscan of an internal web application, which reports the following:
I'm not sure how to interpret these and couldn't find an elaboration of what exactly this ...
0
votes
3
answers
405
views
Is a random number secure (enough) for card numbers and pins?
I've been given the task of generating some gift tokens which comprise a serial number and a pin number, analagous to a pre-paid credit card. The serial and pin will be printed on a card, with the pin ...
0
votes
0
answers
115
views
How could I verify that a contract was actually sent to me from the client as soon as the contract is received?
If I want to store electronic contracts for clients over a long period of time. I need to make sure that those files are not readable by anyone other than the client until the client retrieves them at ...
2
votes
2
answers
459
views
Is there such a cryptographic algorithm?
Is there such a cryptographic algorithm that will encrypt any file with a password. But when decrypting, if the password is incorrect, the file will be decrypted, but instead of relevant data there ...
3
votes
2
answers
202
views
Search for existence of sensitive substring without revealing substring in cleartext
I have a list of very sensitive strings and I want to ensure that these strings do not exist in a set of documents (potentially very large documents).
However, these substrings are so sensitive that ...
1
vote
2
answers
1k
views
Most secure algorithms for KDF and Public Key Encryption [duplicate]
I'm developing an application which will need to derive a private/public key pair from a user provided password, and then use the public key to encrypt some text (up to 1000 characters in length) such ...
2
votes
1
answer
338
views
IPsec installed algorithms
What happens if a laptop and a server don't have a encryption algorithm in common?
Does IPSec abort the connection or does it always have default algorithms?
0
votes
1
answer
339
views
Can we implement custom algorithms to encode and decode wifi password hashes between Windows 10 and our Router?
Windows 10 has its own way of encrypting hashes, but these can be brute-forced by hashcat. One of our students created 2 of his own password encryption algorithms in python (One for encode, one for ...
4
votes
1
answer
345
views
Safe encryption algorithm that works with files bigger than 68GB
In my Java application, I used AES/GCM/NoPadding algorithm for encryption, however it throws an exception when I try to encrypt files bigger than ~68GB. From what I read, it is limit of data that can ...
2
votes
2
answers
1k
views
Encryption and Hash algorithms explanation
I am using Veracrypt and there are encryption and hash algorithms
Can anyone explain simply what do each algorithm does?
Encryption algorithms encrypt your data/file, Hash algorithm hashes your ...
0
votes
2
answers
422
views
What is the standard practice to maintain a password for different websites? [duplicate]
I have come across many users who maintain a re-used password for each and every website, such as P@ssw0rd123
The problem with this approach is if someone breaches the protections of a particular ...
3
votes
0
answers
357
views
How does WPA3 provide forward secrecy?
Someone told me that in WPA2, forward secrecy is achieved by generating ephemeral keys through the handshake’s nonces, but I couldn't find how WPA3 achieves it exactly (could not find info regarding ...
0
votes
1
answer
7k
views
What encryption algorithm outputs 22 characters string? [duplicate]
I have a bunch of encoded strings and I am trying to figure the encryption algorithm behind it. I would appreciate if you could help me find which encryption algorithm it is, or if you could point me ...