Skip to main content

Questions tagged [encryption]

Encryption is the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.

Filter by
Sorted by
Tagged with
0 votes
0 answers
24 views

Can data be recovered from a factory reset iPhone 14 Pro Max with no passcode? [closed]

I know there have been various questions asked on this topic before, but I haven't seen a question that focused specifically on whether data from a factory reset iPhone could be recovered if a ...
GenericAccount4000's user avatar
1 vote
1 answer
99 views

Is it safe to publish encrypted secrets in a git repository?

Tools like Ansible Vault, CNCF SOPS or Chezmoi make it easiy to keep secrets encrypted in version control, so that you can publish the repository, but still use the secrets inside when deploying. This ...
Tyler's user avatar
  • 13
1 vote
0 answers
46 views

What are the acceptable ranges of MSE, MAE, and PSNR values in the context of image encryption? [migrated]

In my research on image encryption, I use the metrics below to evaluate the level of distortion between the original image ( I ) and its encrypted version ( I' ): MSE (Mean Squared Error) MAE (Mean ...
Karim's user avatar
  • 11
1 vote
1 answer
59 views

Exposing size of last chunk in RSA file encryption

So I'm implementing RSA encryption. I'm processing input in chunks of known constant size (depends on modulus) but the last chunk might be smaller so I save its size in plaintext at the end of output ...
Maq's user avatar
  • 113
2 votes
0 answers
74 views

Is a write-cache in my Synology NAS exposing unencrypted data?

I have encrypted mounts in my Synology DS 918+ and I'm using an additional SSD leftover as a write-cache. When I have an encrypted directory mounted, are there unencrypted bits stored on the SSD? Do ...
Daniel W.'s user avatar
  • 297
0 votes
1 answer
93 views

Why use the data protection classes of iOS

According to https://support.apple.com/en-ca/guide/security/secb010e978a/web: If a file isn’t assigned a Data Protection class, it is still stored in encrypted form (as is all data on an iPhone, iPad,...
ArcticMeltdown's user avatar
0 votes
1 answer
44 views

Hashed passwords question and encryption [duplicate]

Apologies if this is a basic question. I understand that when I log into a website, I send my password in an encrypted form. This gets unencrypted by the server and my password is hashed and compared ...
Richard's user avatar
  • 21
0 votes
1 answer
36 views

Do I need session keys/rotation with libsodium's crypto_secretbox_easy?

I have a system of several nodes communicating using crypto_secretbox_easy from libsodium (https://libsodium.gitbook.io/doc/secret-key_cryptography/secretbox), which apparently uses XSalsa20 ...
PhilipRoman's user avatar
2 votes
0 answers
48 views

How to Anonymize Entry Nodes in an Encrypted Traffic System Using Threshold Cryptography?

I'm designing an encrypted traffic system where users can stay anonymous while learning more about networking and security. Anonymity is achieved through layered encryption, where traffic passes ...
Lixt's user avatar
  • 121
1 vote
1 answer
133 views

AES-256 Encrypted Text Differs [closed]

I am learning about how AES encryption works. I understand the overall process, but I think I've missed something. Let's say I have this text to encrypt: "vulkanski izbruh" – 16 characters (...
CBCyber's user avatar
  • 27
0 votes
1 answer
67 views

Is encrypting REST exposed database identifiers a bad idea?

At the end of Insecure_Direct_Object_Reference_Prevention_Cheat_Sheet it says Avoid encrypting identifiers as it can be challenging to do so securely. On login I store a cryptographically generated ...
fundagain's user avatar
  • 103
1 vote
0 answers
54 views

What are some reliable and well-maintained Post-Quantum Cryptography (PQC) libraries with Go support? [closed]

I am looking for reputable libraries or solution providers that offer reliable, well-maintained, and well-documented implementations of post-quantum cryptographic (PQC) algorithms. Specifically, I am ...
Geek's user avatar
  • 19
8 votes
2 answers
4k views

Is password-based encryption better than traditional password hashing?

I have a theoretical question regarding the comparison of password-based encryption and password hashing. Not sure if Stackoverflow or crypto is the best place, but this is more on the side of ...
Landon Crabtree's user avatar
2 votes
1 answer
112 views

Does revealing semantic similarity scores between AES-encrypted data create an exploitable side channel?

Background: My expertise is in machine learning/AI, not cryptography, so I apologize if I'm missing fundamental security concepts. I'm trying to build a privacy-preserving AI agent system and want to ...
BBenyani's user avatar
  • 123
2 votes
1 answer
98 views

How does memory encryption keep the decryption key secure from memory without a seperate HSM?

For example the Go package memguard. Couldn't a devoted attacker just find the encryption key in memory? Is it that some forms of attacks can't expose all of memory but only adjacent memory/memory in ...
Aidan's user avatar
  • 145

15 30 50 per page
1
2 3 4 5
398