Skip to main content

Questions tagged [algorithm]

Algorithm is a set of step-by-step operations to be performed including calculations, data processing, and automated reasoning.

Filter by
Sorted by
Tagged with
0 votes
0 answers
50 views

I know the plaintext of this hash is no input 86E80EBA5AF396507BCE69ADE203A489F8BB2319 and this hash is cuttingsteel1952: B493394637ED3C2E25D84F71AF2F0BA0C0B55070 How do I identify the hash algorithm ...
Dude Jones's user avatar
0 votes
2 answers
244 views

Context: When the Twitch whole code repository was leaked, it created multiple discussions on social medias. And one day I was on Reddit and said that the leak of the hashing algorithm and the salt ...
CARLOS EDUARDO NISHI's user avatar
1 vote
0 answers
114 views

Is there anything that works like the opposite of a hash algorithm? Today we know many hash algorithms, which take an input, perform some math on it, and output a value which is different than the ...
Finn 's user avatar
  • 11
0 votes
1 answer
2k views

I'm trying to setup a custom order of TLS cipher suites according to this Microsoft list, on Windows Server 2022 but the outcome is not the one that I was expecting. After using the powershell to ...
cadobe's user avatar
  • 3
2 votes
3 answers
471 views

I have a list of hashes, I need to find the original value of any of them. So far I know that the hashes are only numbers of length 30. The format should be something like ...
Spiral's user avatar
  • 23
2 votes
1 answer
414 views

An encrypted ext4 container will always leak the superblock information. So encrypting an unencrypted metadata file system like ext4 is inherently vulnerable because it instaleaks? Shouldn't it then ...
user145453's user avatar
5 votes
1 answer
997 views

I am working on an application which has a requirement to send very small messages (<64 bits), asynchronously, and using secure asymmetric encryption. We've experimented with simple RSA + OAEP, and ...
superstator's user avatar
0 votes
1 answer
1k views

In cryptography, generally we have two ways of handling sensitive information. We can use one-way encryption such as hashing. This is useful when we never need to retrieve it again. In this case, we ...
azoundria's user avatar
  • 773
-1 votes
1 answer
200 views

Are there any advanced security technologies, for example, establishing a secured connection, which first require authentication based on security through organic-like changing obscurity of secrecy? I'...
S To's user avatar
  • 1
1 vote
0 answers
129 views

Hi is there any solid algorithm or solution where I can refer to for preventing dos (denial of service)attack on my apache server ? I did the dos attack using slowloris in ubuntu and switchblade in ...
wanglen soram's user avatar
-1 votes
1 answer
160 views

I have a local application that normally authenticates against a remote Active Directory server. If the local host loses network connectivity, a special local account becomes available for login. ...
Dave's user avatar
  • 99
1 vote
1 answer
3k views

I did a vulnerability scan on some of our company workstations. These are workstations used by employees (dev, HR, accounting, etc.) to do their job. One of the common result I found is SSL/TLS ...
Finn's user avatar
  • 33
3 votes
2 answers
7k views

I'm looking at the results of an sslscan of an internal web application, which reports the following: I'm not sure how to interpret these and couldn't find an elaboration of what exactly this ...
lisa-thehexbit's user avatar
0 votes
3 answers
405 views

I've been given the task of generating some gift tokens which comprise a serial number and a pin number, analagous to a pre-paid credit card. The serial and pin will be printed on a card, with the pin ...
Greg B's user avatar
  • 181
0 votes
0 answers
115 views

If I want to store electronic contracts for clients over a long period of time. I need to make sure that those files are not readable by anyone other than the client until the client retrieves them at ...
Brooney's user avatar
  • 73
2 votes
2 answers
459 views

Is there such a cryptographic algorithm that will encrypt any file with a password. But when decrypting, if the password is incorrect, the file will be decrypted, but instead of relevant data there ...
optic1's user avatar
  • 31
3 votes
2 answers
202 views

I have a list of very sensitive strings and I want to ensure that these strings do not exist in a set of documents (potentially very large documents). However, these substrings are so sensitive that ...
Matt Harrison's user avatar
1 vote
2 answers
1k views

I'm developing an application which will need to derive a private/public key pair from a user provided password, and then use the public key to encrypt some text (up to 1000 characters in length) such ...
vikarjramun's user avatar
2 votes
1 answer
338 views

What happens if a laptop and a server don't have a encryption algorithm in common? Does IPSec abort the connection or does it always have default algorithms?
Dario Blair's user avatar
0 votes
1 answer
339 views

Windows 10 has its own way of encrypting hashes, but these can be brute-forced by hashcat. One of our students created 2 of his own password encryption algorithms in python (One for encode, one for ...
Nikhil Bansal's user avatar
4 votes
1 answer
345 views

In my Java application, I used AES/GCM/NoPadding algorithm for encryption, however it throws an exception when I try to encrypt files bigger than ~68GB. From what I read, it is limit of data that can ...
Michal Ruszkowski's user avatar
2 votes
2 answers
1k views

I am using Veracrypt and there are encryption and hash algorithms Can anyone explain simply what do each algorithm does? Encryption algorithms encrypt your data/file, Hash algorithm hashes your ...
mtmoblan's user avatar
0 votes
2 answers
422 views

I have come across many users who maintain a re-used password for each and every website, such as P@ssw0rd123 The problem with this approach is if someone breaches the protections of a particular ...
Pawan Patil's user avatar
3 votes
0 answers
357 views

Someone told me that in WPA2, forward secrecy is achieved by generating ephemeral keys through the handshake’s nonces, but I couldn't find how WPA3 achieves it exactly (could not find info regarding ...
almb's user avatar
  • 129
0 votes
1 answer
7k views

I have a bunch of encoded strings and I am trying to figure the encryption algorithm behind it. I would appreciate if you could help me find which encryption algorithm it is, or if you could point me ...
Alexandre Barfuhok's user avatar