About 31,900 results
Open links in new tab
  1. How can I decrypt data with Java, without hard-coding the key?

    I hope this is not a chicken-egg problem or reinventing the wheel but here goes. I have a Java application that needs to access a password protected file (actually during the application …

  2. Is there a simple example of an Asymmetric encryption/decryption ...

    Square root is not so hard, power of 3 means you need a cubed root, but power of 34,051,489 is pretty hard. There are other mathematical operations that are difficult to reverse-engineer. …

  3. Cellular encryption algorithms currently in use globally

    Sep 4, 2015 · A5/4 isn't Snow 3G - it is a full length 128-bit key version of A5/3 using the Kasumi algorithm. See 3GPP TS 55.226. The Kasumi algorithm applied to GSM uses a 64 bit key …

  4. Is it important for an ethical hacker to know the C language in …

    Nov 29, 2020 · Of course, you don't necessarily have to know C, or the given platform's Assembly (read: instruction set), but knowing them is a great help in figuring out many possible low-level …

  5. Steganography to hide text within text - Information Security Stack ...

    May 5, 2025 · The 5-bit coding corresponds to cases e.g. in classical crypto where the text is confined to be in an alphabet of 26 characters and without spaces. In the general case you …

  6. Why do best practices recommend against adding your own …

    Nov 2, 2024 · Hard-coding secrets in some file doesn't provide optimal protection. Contrary to your assumption, a “pepper” does not prevent an attacker from logging in with a known …

  7. How to store salt? - Information Security Stack Exchange

    May 6, 2025 · If you use the same salt for every password, the computational complexity of the brute force algorithm is significantly reduced. Furthermore, an attacker could see which users …

  8. Any hints for programming my own password manager?

    A lot of people, including those with a sufficient understanding of cryptography and secure coding practices, under-estimate the difficulty in getting a password manager right. However, you …

  9. How does the key-system work? - Information Security Stack …

    Apr 2, 2016 · The shipped software contains an algorithm that checks whether or not a serial is valid. The software creator has a piece of software that allows him to create serial numbers for …

  10. Standards for encrypting passwords in configuration files?

    May 16, 2012 · For example, you can use access control to limit access to the key file but still maintain a more open ACL for the config file. Similarly, you can implement auditing for access …

Refresh