
How would one crack a weak but unknown encryption protocol?
To give an other example of the 'security through obscurity' and 'well-known algorithms' combination approach: When doing a cryptographic hash, applying an injective function (such …
cryptography - How valuable is secrecy of an algorithm?
Nov 24, 2012 · To be clear, this isn't about creating a new, untested algorithm, but rather keeping secret the details of which algorithm you choose. For example, the technique Windows uses to …
Steganography to hide text within text - Information Security Stack ...
Sep 20, 2012 · The 5-bit coding corresponds to cases e.g. in classical crypto where the text is confined to be in an alphabet of 26 characters and without spaces. In the general case you …
Why do best practices recommend against adding your own …
Nov 2, 2024 · Both are perfectly valid applications of standard algorithms. Note that the pepper should be kept in a specialized key store like the Linux Kernel Key Retention Service or on a …
What cryptographic algorithms are not considered secure?
Nov 12, 2010 · many (too many) handmade algorithms from people who oversmarted themselves; a prime example being CSS, the encryption for DVD. Secure alternatives: SHA-256 for …
appsec - How to securely hash passwords? - Information Security …
Nov 12, 2010 · Rainbow tables for common password algorithms (eg, NTLM, MD5, etc) can be found online, making it fairly straightforward to get access to large volumes of them. There are …
Recommended # of iterations when using PBKDF2-SHA256?
Obligatory note for everyone coming here: Nowadays you should seriously consider using better key stretching algorithms than PKBDF2 as it is highly parralisable. Consider Argon2 as the …
Password Hashing: add salt + pepper or is salt enough?
Apr 22, 2011 · (Note: using a salt is only half of the job; you also need to make the hash function slow -- so that attacking a single low-entropy password is still difficult.
Why we need complicate truncation for the OTP?
Mar 15, 2022 · "Why we need sophisticated truncation algorithms?" - do we? The one used as example in RFC6238 is just using as much leading bits as needed. " just the first 6-8 digits …
pfx file encryption algorithm - Information Security Stack Exchange
Jul 9, 2020 · Does this mean that the pfx file is encrypted using TripleDES? Yep. PFX/PKCS#12 files originally used an extended version of PBES1 (Password-Based Encryption Scheme 1) …