Questions tagged [encryption]
Encryption is the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.
5,968 questions
0
votes
0
answers
24
views
Can data be recovered from a factory reset iPhone 14 Pro Max with no passcode? [closed]
I know there have been various questions asked on this topic before, but I haven't seen a question that focused specifically on whether data from a factory reset iPhone could be recovered if a ...
1
vote
1
answer
99
views
Is it safe to publish encrypted secrets in a git repository?
Tools like Ansible Vault, CNCF SOPS or Chezmoi make it easiy to keep secrets encrypted in version control, so that you can publish the repository, but still use the secrets inside when deploying. This ...
1
vote
0
answers
46
views
What are the acceptable ranges of MSE, MAE, and PSNR values in the context of image encryption? [migrated]
In my research on image encryption, I use the metrics below to evaluate the level of distortion between the original image ( I ) and its encrypted version ( I' ):
MSE (Mean Squared Error)
MAE (Mean ...
1
vote
1
answer
59
views
Exposing size of last chunk in RSA file encryption
So I'm implementing RSA encryption. I'm processing input in chunks of known constant size (depends on modulus) but the last chunk might be smaller so I save its size in plaintext at the end of output ...
2
votes
0
answers
74
views
Is a write-cache in my Synology NAS exposing unencrypted data?
I have encrypted mounts in my Synology DS 918+ and I'm using an additional SSD leftover as a write-cache.
When I have an encrypted directory mounted, are there unencrypted bits stored on the SSD?
Do ...
0
votes
1
answer
93
views
Why use the data protection classes of iOS
According to https://support.apple.com/en-ca/guide/security/secb010e978a/web:
If a file isn’t assigned a Data Protection class, it is still stored in encrypted form (as is all data on an iPhone, iPad,...
0
votes
1
answer
44
views
Hashed passwords question and encryption [duplicate]
Apologies if this is a basic question.
I understand that when I log into a website, I send my password in an encrypted form. This gets unencrypted by the server and my password is hashed and compared ...
0
votes
1
answer
36
views
Do I need session keys/rotation with libsodium's crypto_secretbox_easy?
I have a system of several nodes communicating using crypto_secretbox_easy from libsodium (https://libsodium.gitbook.io/doc/secret-key_cryptography/secretbox), which apparently uses XSalsa20 ...
2
votes
0
answers
48
views
How to Anonymize Entry Nodes in an Encrypted Traffic System Using Threshold Cryptography?
I'm designing an encrypted traffic system where users can stay anonymous while learning more about networking and security. Anonymity is achieved through layered encryption, where traffic passes ...
1
vote
1
answer
133
views
AES-256 Encrypted Text Differs [closed]
I am learning about how AES encryption works. I understand the overall process, but I think I've missed something. Let's say I have this text to encrypt:
"vulkanski izbruh" – 16 characters (...
0
votes
1
answer
67
views
Is encrypting REST exposed database identifiers a bad idea?
At the end of Insecure_Direct_Object_Reference_Prevention_Cheat_Sheet it says
Avoid encrypting identifiers as it can be challenging to do so securely.
On login I store a cryptographically generated ...
1
vote
0
answers
54
views
What are some reliable and well-maintained Post-Quantum Cryptography (PQC) libraries with Go support? [closed]
I am looking for reputable libraries or solution providers that offer reliable, well-maintained, and well-documented implementations of post-quantum cryptographic (PQC) algorithms. Specifically, I am ...
8
votes
2
answers
4k
views
Is password-based encryption better than traditional password hashing?
I have a theoretical question regarding the comparison of password-based encryption and password hashing. Not sure if Stackoverflow or crypto is the best place, but this is more on the side of ...
2
votes
1
answer
112
views
Does revealing semantic similarity scores between AES-encrypted data create an exploitable side channel?
Background: My expertise is in machine learning/AI, not cryptography, so I apologize if I'm missing fundamental security concepts. I'm trying to build a privacy-preserving AI agent system and want to ...
2
votes
1
answer
98
views
How does memory encryption keep the decryption key secure from memory without a seperate HSM?
For example the Go package memguard.
Couldn't a devoted attacker just find the encryption key in memory? Is it that some forms of attacks can't expose all of memory but only adjacent memory/memory in ...