
How can I decrypt data with Java, without hard-coding the key?
I hope this is not a chicken-egg problem or reinventing the wheel but here goes. I have a Java application that needs to access a password protected file (actually during the application …
Is there a simple example of an Asymmetric encryption/decryption ...
Square root is not so hard, power of 3 means you need a cubed root, but power of 34,051,489 is pretty hard. There are other mathematical operations that are difficult to reverse-engineer. …
Cellular encryption algorithms currently in use globally
Sep 4, 2015 · A5/4 isn't Snow 3G - it is a full length 128-bit key version of A5/3 using the Kasumi algorithm. See 3GPP TS 55.226. The Kasumi algorithm applied to GSM uses a 64 bit key …
Is it important for an ethical hacker to know the C language in …
Nov 29, 2020 · Of course, you don't necessarily have to know C, or the given platform's Assembly (read: instruction set), but knowing them is a great help in figuring out many possible low-level …
Steganography to hide text within text - Information Security Stack ...
May 5, 2025 · The 5-bit coding corresponds to cases e.g. in classical crypto where the text is confined to be in an alphabet of 26 characters and without spaces. In the general case you …
Why do best practices recommend against adding your own …
Nov 2, 2024 · Hard-coding secrets in some file doesn't provide optimal protection. Contrary to your assumption, a “pepper” does not prevent an attacker from logging in with a known …
How to store salt? - Information Security Stack Exchange
May 6, 2025 · If you use the same salt for every password, the computational complexity of the brute force algorithm is significantly reduced. Furthermore, an attacker could see which users …
Any hints for programming my own password manager?
A lot of people, including those with a sufficient understanding of cryptography and secure coding practices, under-estimate the difficulty in getting a password manager right. However, you …
How does the key-system work? - Information Security Stack …
Apr 2, 2016 · The shipped software contains an algorithm that checks whether or not a serial is valid. The software creator has a piece of software that allows him to create serial numbers for …
Standards for encrypting passwords in configuration files?
May 16, 2012 · For example, you can use access control to limit access to the key file but still maintain a more open ACL for the config file. Similarly, you can implement auditing for access …