15,286 questions
-2
votes
0
answers
22
views
accumulator problem to know which set contain a element? [closed]
Problem statement.
Given :
Set1 = (a * b * c * d * ……) MOD N
Set2 = (e * f * g * ….) MOD N
c, g.
We want to know from which set c and g belong, see we only have the above final value’s {
set1, set2, N,...
-4
votes
0
answers
34
views
Is it possible to run javascript on client side when implementing a telegram bot? [closed]
Is it possible to run javascript on client side when implementing a telegram bot?
To be more specific, I want to generate key pair on client, but don't let the bot know the client private key, and use ...
0
votes
0
answers
40
views
How to Implement Authentication with the NIMLAB Crypto Exchange API in PHP?
I'm trying to implement authentication to connect with the NIMLAB crypto exchange, following their official documentation: NIMLAB API Docs.
However, I keep running into issues with the authentication ...
1
vote
2
answers
39
views
bitcoinlib signing raw text message using python
I am trying to sign a raw message, like "Hello World", using the Python library bitcoinlib. The goal is to generate a base64-encoded signature for the message that can be verified. However, ...
0
votes
0
answers
15
views
Mock Router ParserError: Expected ';' but got identifier
This mock router is not working. The code is below followed by the error message in bold. I have been calling ^0.8.19 and have updated npm, and checked my hardhat config file and do not see the issue.
...
0
votes
0
answers
21
views
Transactions failing for eth transfers in python using web3
I wanted to send USDT ERC-20 using this code and somehow I get errors for transfers some failed transaction hashes:
https://etherscan.io/tx/...
0
votes
0
answers
25
views
How do I fix runtime error when executing BKZ reduction in FPYLLL?
I'm trying to use BKZ reduction as part of the primal attack on an MLWE instance. When I run the reduction as seen below, I will receive a runtime error.
Code
def small_poly_vector(size, high=2, low=-...
0
votes
0
answers
32
views
Spring Boot configuration file field encryption
I have a Spring Boot based application that is posting a listen on a port with SSL and associated keystore and trust store. I have a class that decrypts the fields that contain the passwords for those ...
-4
votes
0
answers
22
views
identify the cryptography algorithm [closed]
what are the unique features in aes,des,and rsa algorithm so that it can we identified. our project is trying to identify the algorithms used in encryption like by processing the encrypted text from ...
0
votes
0
answers
31
views
How to do RSA Encryption in Python using PyCryptodome
I am new to the world of encryption and I was wondering if my solution for encrypting/decrypting data is okay.
When creating this, I referenced the API documentation from PyCryptodome: https://...
0
votes
0
answers
29
views
Otp is not verifying
Tech stack being used: Next js jsx, Prisma, Postgre, Zod, Nodemailer, Crypto
Issue: When I sign up and fill in the required data (Name, email, Password), an otp (one-time password) is generated and is ...
0
votes
1
answer
54
views
How to convert a PEM PKCS#8 public key into DER/Raw-Binary
I have an EC Public Key (i think it is pkcs#8 PEM but not really sure because i am not much familiar with these terms):
-----BEGIN PUBLIC KEY-----
...
-1
votes
0
answers
43
views
How do I convert HOTP counter value to unsigned char*?
I am now facing issues implementing HOTP using HMAC-SHA1. I am not sure how do I convert the "Counter" from int to unsigned char* for HMAC hashing.
I call hmac_6_digit_totp() as below
...
2
votes
1
answer
47
views
Encoding P-256 EC Key to JWK in Zig
I'm building an ACME client in Zig and I'm currently stuck on encoding a JWK (JSON Web Key) for an EC key. Specifically, I'm having trouble encoding the P-256 (ECDSA) key to a JWK format. Here’s the ...
-5
votes
0
answers
44
views
"Change index is not an enumerative of Bip44Changes" While using bip-utils to generate BTC private keys [closed]
So my code looks like this so far:
def generate_BTC_address(self, passphrase=""):
try:
# Generar la semilla usando la frase mnemotécnica y la passphrase
seed_generator = ...
1
vote
0
answers
74
views
HMAC-SHA256 hash using OpenSSL does not match hash from online tools
I am trying to use OpenSSL 3.4.0 to generate an HMAC hash EVP_sha256. However, I am not able to match my generated hash to online tools (tried: base32 encoded key for each side).
Here is my source ...
0
votes
1
answer
40
views
HKDF function in Python and NodeJS give different results, why?
While working on implementing encryption/decryption between a Python backend server and a NodeJS frontend, my decryption attempts on the frontend were failing. I noticed that HKDF result generated by ...
0
votes
0
answers
43
views
Google play warning about unsafe encryption in flutter app [closed]
I am able to publish my app over playstore however there is always a warning appears when I push a new release as below.
Unsafe Encryption
Your app contains unsafe cryptographic encryption patterns. ...
1
vote
1
answer
94
views
AES-GCM-256 partial decryption
How to decrypt only first block without authentication? I tried with cipher.AEAD, but the Open function expects that at the end there will be tag bytes for authentication. I think I need to create ctr ...
-1
votes
0
answers
37
views
Vectorized MD5 implemention in c# not returning the correct hash
I tried to implement md5 in c#, here is the code:
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
using System.Numerics;
using ...
0
votes
1
answer
34
views
Importing cryptography Issue
First, I was writing a program that allows people to create a secure file like writing a file and encrypt it I started for 3 weeks the cryptography was working just fine till today I wanted to run my ...
1
vote
1
answer
53
views
NoSuchAlgorithmException while reading elliptic curve key based p12 file from raw resources of android in android application
I am trying to read elliptic curve key-based PKCS#12 file using the BouncyCastle provider. But it is throwing the following exception
java.lang.RuntimeException: java.io.IOException: exception ...
0
votes
0
answers
16
views
Getting error while trying to generate wtns file in ZKP
Actullay I was trying to generate a witness file in a zero knowledge project. Here is my circom code
pragma circom 2.0.0;
include "./node_modules/circomlib/circuits/poseidon.circom";
...
0
votes
0
answers
26
views
Google Tink - Handling the scenario of key compromise
I understand that Google Tink provides support for working with multiple keys with single primary key along with key rotation support.
But my questions is, lets say I have 1 million entries encrypted ...
0
votes
0
answers
30
views
Can someone explain how MEV bot was still able to perform a front-run?
Can someone please enlighten me how a bot was still able to buy this token from the pancakeswap exchange if I put in the transferFrom function that it can only be bought if the from address is this ...
-1
votes
0
answers
31
views
Possible to bypass Google Verification on Login?
I wanted to write a bot to scrape long-time statistics on https://www.coinscrash.com/ but I realized they have a google verification on the login form. Now I was wondering if it's even possible to ...
1
vote
0
answers
59
views
Why are characters in my RING-LWE Encryption being swapped?
I'm developing a Secure Chat Application using Ring-LWE for my cryptography and securities project using Java in a Client-Server environment. I have so far implemented the logic behind the key sharing ...
0
votes
1
answer
48
views
How, exactly, does Spring's PasswordEncoder apply salt to the plaintext?
I have looked at the docs, and I don't know that it's specified. I'm not sure how to dive into the source code to learn this either. That's a viable solution.
I'm in the unfortunate position of ...
0
votes
0
answers
60
views
iOS generating invalid signature with SecureEnclave protected key pair
I'm facing an issue with 0.01% of user base having problems generating signature. Basically, they are able to generate key pair but the resulting signature is invalid when validated with the public ...
0
votes
1
answer
68
views
Implement a Java SecretKey that supports destruction and is thread-safe
I am writing a custom Java SecretKey implementation that supports destruction and is thread-safe. Please see my code below:
public class DSecretKey implements SecretKey, KeySpec {
final String ...
-2
votes
1
answer
109
views
Fernet key must be 32 url-safe base64-encoded bytes - How to create a key for use with Fernet?
An example Fernet key
The following code produces an example Fernet key, and reports that the length is 44.
from cryptography.fernet import Fernet
generated_key = Fernet.generate_key()
print(f'...
0
votes
0
answers
36
views
How to sign <EncryptedAssertion> element using the STR-Transform algorithm in c#
In the SOAPEnvelope.
I wants to signed the xml element 'EncryptedAssertion'.
<EncryptedAssertion>
<EncryptedData>....</EncryptedData>
</EncryptedAssertion>
using the ...
1
vote
0
answers
135
views
AES encryption by JS can't be decrypted by PHP
Goal
I am doing a proof of concept of a symmetric key encryption. A javascript code will send a AES encrypted string, which i want to decrypt via php.
Attempt
ON the client side, we have:
<script ...
0
votes
0
answers
59
views
Evaluate the security of the message encryption extension
I created exrension for Firefox, but i'm not really sure about it's security. Can somebody help, how my program should store permanent keys? Now i keep them in local storage encrypted, but this ...
0
votes
1
answer
60
views
How to use an RSA key for Duende Identity Server v7
My thought process was:
Create the RSA key in Azure Key Vault --> Keys
Retrieve the key using KeyClient
Pass the key to AddSigningCredential
Here is the C# code
string keyVaultUrl = Configuration....
0
votes
0
answers
38
views
Is there a limitation on the size of data (Key Material) that an AWS KMS Wrapping Key can encrypt?
I have a 4096-RSA Private key that I want to use as key material in AWS KMS to generate a KMS key.
While setting up an external key in AWS KMS, it does not let us upload a Key Material directly for ...
-1
votes
0
answers
94
views
Performance in rust for secp256k1 private key to bitcoin address generation (Multi-Threading)
recently I stumbled upon the ~1000 BTC Bitcoin Challenge Transaction. So In my process of wanting to learn rust anyways, I tried to create a simple program which generates random numbers within a ...
-2
votes
0
answers
44
views
How to connect the node extension
I am trying to use this code to connect directly to a gradient node (extension by mqtt). After trying to connect I always receive same message:
< Received: WSMessage(type=<WSMsgType.CLOSE: 8>...
0
votes
1
answer
135
views
How can encrypt\encode (Base64) for a generated key including secret message with 2nd public data key in Python?
I'm trying to encrypt the a new generated key using another public key belongs to my friend recipient_public_key, then encode the final output in Base64. This process also can be done step by step ...
1
vote
1
answer
34
views
Is there a way to securely transmit data (a TLS version) in 32 byte packets?
There are several cheap radio modules (nRF24L01 for example) that are only capable of transmitting a 32 byte packets. That is too small for including a HMAC computed with any modern protocol and an IV....
0
votes
0
answers
50
views
try to understand OpenSSL EVP_DigestSign functions
I am still learning to use EVP_DigestSign functions (https://docs.openssl.org/master/man3/EVP_DigestSignInit/#description). One thing I feel puzzled is that the digest type is somehow restricted to ...
1
vote
0
answers
15
views
Configuring SSL/TLS encryption for data in transit - GridDB
I’m trying to configure secure data storage and retrieval using the GridDB database with TLS/SSL encryption for data in transit. I want to encrypt sensitive data before storing it and decrypt it upon ...
1
vote
1
answer
90
views
Creating a PKCS#1 v2.1 signature with C#
I'm trying to port a reference implementation that signs a challenge using a PKCS#12 certificate from Java to C#. As far as I understand the reference, the signature should be a PKCS#1 v2.1 signature (...
-4
votes
1
answer
131
views
RSA decryption python [closed]
How to find p,q,a if they random?
i have this script
from Crypto.Util.number import getPrime
p,q = getPrime(256), getPrime(256)
n = p*q
a = getPrime(128)
c1 = (p-a)**2>>128
c2 = (q+a)**2>>...
0
votes
0
answers
64
views
"error": "'NoneType' object has no attribute 'seek'" when trying to decode the message in the file
I've been working on a project that embeds ciphertext into a PNG file using LSB. My lsb_encode function works, the IV is correctly saved in the metadata (I've checked) and overall the file is usable. ...
0
votes
1
answer
50
views
how to extract public key from auth data webauth in Rust and verify it?
i have stucked to extract the Auth Data from Webauth api attention into Public Key
for this case i am using coset, openssl, ciborium to extract the public key and cose key
here is how i implement to ...
-1
votes
1
answer
57
views
Generate all possible pairings of letters with no repetitions in javascript
I'm playing a game where an Enigma M3 cipher is being used. It isn't meant to be played this way, but I'm finding it fun. For the current clue, the plug board for the cipher isn't known.
A plug board ...
0
votes
0
answers
51
views
Cannot decrypt private ED25519 key generated with cryptography Python module in ssh-keygen
1. Minimal Python code
import os
from stat import S_IRUSR
from stat import S_IWUSR
from cryptography.hazmat.primitives.asymmetric import ed25519
from cryptography.hazmat.primitives.serialization ...
0
votes
1
answer
111
views
Unpad/decode OAEP padded decrypted data
I decrypt a byte array on a smartcard and receive data back from the smartcard. This decrypted data is still in the OAEP padding. Is there a simple way in C# to "unpad" decrypted data? The ...
1
vote
0
answers
117
views
Validating a Shopify Webhook
In Shopify, webhooks can be created for certain events that take place in the admin such as updating a product and they provide a note that says:
Your webhooks will be signed with
...