Skip to main content
Filter by
Sorted by
Tagged with
-2 votes
0 answers
22 views

accumulator problem to know which set contain a element? [closed]

Problem statement. Given : Set1 = (a * b * c * d * ……) MOD N Set2 = (e * f * g * ….) MOD N c, g. We want to know from which set c and g belong, see we only have the above final value’s { set1, set2, N,...
user28766874's user avatar
-4 votes
0 answers
34 views

Is it possible to run javascript on client side when implementing a telegram bot? [closed]

Is it possible to run javascript on client side when implementing a telegram bot? To be more specific, I want to generate key pair on client, but don't let the bot know the client private key, and use ...
Patrick Bernardina's user avatar
0 votes
0 answers
40 views

How to Implement Authentication with the NIMLAB Crypto Exchange API in PHP?

I'm trying to implement authentication to connect with the NIMLAB crypto exchange, following their official documentation: NIMLAB API Docs. However, I keep running into issues with the authentication ...
Alex Frox's user avatar
1 vote
2 answers
39 views

bitcoinlib signing raw text message using python

I am trying to sign a raw message, like "Hello World", using the Python library bitcoinlib. The goal is to generate a base64-encoded signature for the message that can be verified. However, ...
Sorry_my_code_is_dumb's user avatar
0 votes
0 answers
15 views

Mock Router ParserError: Expected ';' but got identifier

This mock router is not working. The code is below followed by the error message in bold. I have been calling ^0.8.19 and have updated npm, and checked my hardhat config file and do not see the issue. ...
MasterBlends's user avatar
0 votes
0 answers
21 views

Transactions failing for eth transfers in python using web3

I wanted to send USDT ERC-20 using this code and somehow I get errors for transfers some failed transaction hashes: https://etherscan.io/tx/...
Ahmed Mohamed's user avatar
0 votes
0 answers
25 views

How do I fix runtime error when executing BKZ reduction in FPYLLL?

I'm trying to use BKZ reduction as part of the primal attack on an MLWE instance. When I run the reduction as seen below, I will receive a runtime error. Code def small_poly_vector(size, high=2, low=-...
Xav's user avatar
  • 1
0 votes
0 answers
32 views

Spring Boot configuration file field encryption

I have a Spring Boot based application that is posting a listen on a port with SSL and associated keystore and trust store. I have a class that decrypts the fields that contain the passwords for those ...
Scott George's user avatar
-4 votes
0 answers
22 views

identify the cryptography algorithm [closed]

what are the unique features in aes,des,and rsa algorithm so that it can we identified. our project is trying to identify the algorithms used in encryption like by processing the encrypted text from ...
Mehak Kelaskar's user avatar
0 votes
0 answers
31 views

How to do RSA Encryption in Python using PyCryptodome

I am new to the world of encryption and I was wondering if my solution for encrypting/decrypting data is okay. When creating this, I referenced the API documentation from PyCryptodome: https://...
Solitude's user avatar
0 votes
0 answers
29 views

Otp is not verifying

Tech stack being used: Next js jsx, Prisma, Postgre, Zod, Nodemailer, Crypto Issue: When I sign up and fill in the required data (Name, email, Password), an otp (one-time password) is generated and is ...
mashhood rehman's user avatar
0 votes
1 answer
54 views

How to convert a PEM PKCS#8 public key into DER/Raw-Binary

I have an EC Public Key (i think it is pkcs#8 PEM but not really sure because i am not much familiar with these terms): -----BEGIN PUBLIC KEY----- ...
Unknown BL4NK's user avatar
-1 votes
0 answers
43 views

How do I convert HOTP counter value to unsigned char*?

I am now facing issues implementing HOTP using HMAC-SHA1. I am not sure how do I convert the "Counter" from int to unsigned char* for HMAC hashing. I call hmac_6_digit_totp() as below ...
jnl's user avatar
  • 9
2 votes
1 answer
47 views

Encoding P-256 EC Key to JWK in Zig

I'm building an ACME client in Zig and I'm currently stuck on encoding a JWK (JSON Web Key) for an EC key. Specifically, I'm having trouble encoding the P-256 (ECDSA) key to a JWK format. Here’s the ...
Jeff Amerson's user avatar
-5 votes
0 answers
44 views

"Change index is not an enumerative of Bip44Changes" While using bip-utils to generate BTC private keys [closed]

So my code looks like this so far: def generate_BTC_address(self, passphrase=""): try: # Generar la semilla usando la frase mnemotécnica y la passphrase seed_generator = ...
6Cript's user avatar
  • 1
1 vote
0 answers
74 views

HMAC-SHA256 hash using OpenSSL does not match hash from online tools

I am trying to use OpenSSL 3.4.0 to generate an HMAC hash EVP_sha256. However, I am not able to match my generated hash to online tools (tried: base32 encoded key for each side). Here is my source ...
jnl's user avatar
  • 9
0 votes
1 answer
40 views

HKDF function in Python and NodeJS give different results, why?

While working on implementing encryption/decryption between a Python backend server and a NodeJS frontend, my decryption attempts on the frontend were failing. I noticed that HKDF result generated by ...
ZeroByter's user avatar
  • 375
0 votes
0 answers
43 views

Google play warning about unsafe encryption in flutter app [closed]

I am able to publish my app over playstore however there is always a warning appears when I push a new release as below. Unsafe Encryption Your app contains unsafe cryptographic encryption patterns. ...
Suresh Sharma's user avatar
1 vote
1 answer
94 views

AES-GCM-256 partial decryption

How to decrypt only first block without authentication? I tried with cipher.AEAD, but the Open function expects that at the end there will be tag bytes for authentication. I think I need to create ctr ...
Fernader's user avatar
-1 votes
0 answers
37 views

Vectorized MD5 implemention in c# not returning the correct hash

I tried to implement md5 in c#, here is the code: using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.Threading.Tasks; using System.Numerics; using ...
Ömer Enes Özmen's user avatar
0 votes
1 answer
34 views

Importing cryptography Issue

First, I was writing a program that allows people to create a secure file like writing a file and encrypt it I started for 3 weeks the cryptography was working just fine till today I wanted to run my ...
Louhou code's user avatar
1 vote
1 answer
53 views

NoSuchAlgorithmException while reading elliptic curve key based p12 file from raw resources of android in android application

I am trying to read elliptic curve key-based PKCS#12 file using the BouncyCastle provider. But it is throwing the following exception java.lang.RuntimeException: java.io.IOException: exception ...
ahad alam's user avatar
0 votes
0 answers
16 views

Getting error while trying to generate wtns file in ZKP

Actullay I was trying to generate a witness file in a zero knowledge project. Here is my circom code pragma circom 2.0.0; include "./node_modules/circomlib/circuits/poseidon.circom"; ...
Asir Shahriar Roudra's user avatar
0 votes
0 answers
26 views

Google Tink - Handling the scenario of key compromise

I understand that Google Tink provides support for working with multiple keys with single primary key along with key rotation support. But my questions is, lets say I have 1 million entries encrypted ...
Jayavardhan Gange's user avatar
0 votes
0 answers
30 views

Can someone explain how MEV bot was still able to perform a front-run?

Can someone please enlighten me how a bot was still able to buy this token from the pancakeswap exchange if I put in the transferFrom function that it can only be bought if the from address is this ...
Daniel Model's user avatar
-1 votes
0 answers
31 views

Possible to bypass Google Verification on Login?

I wanted to write a bot to scrape long-time statistics on https://www.coinscrash.com/ but I realized they have a google verification on the login form. Now I was wondering if it's even possible to ...
Van Khog's user avatar
1 vote
0 answers
59 views

Why are characters in my RING-LWE Encryption being swapped?

I'm developing a Secure Chat Application using Ring-LWE for my cryptography and securities project using Java in a Client-Server environment. I have so far implemented the logic behind the key sharing ...
SDG8's user avatar
  • 79
0 votes
1 answer
48 views

How, exactly, does Spring's PasswordEncoder apply salt to the plaintext?

I have looked at the docs, and I don't know that it's specified. I'm not sure how to dive into the source code to learn this either. That's a viable solution. I'm in the unfortunate position of ...
Pinwheeler's user avatar
  • 1,111
0 votes
0 answers
60 views

iOS generating invalid signature with SecureEnclave protected key pair

I'm facing an issue with 0.01% of user base having problems generating signature. Basically, they are able to generate key pair but the resulting signature is invalid when validated with the public ...
Max Fratane's user avatar
0 votes
1 answer
68 views

Implement a Java SecretKey that supports destruction and is thread-safe

I am writing a custom Java SecretKey implementation that supports destruction and is thread-safe. Please see my code below: public class DSecretKey implements SecretKey, KeySpec { final String ...
LHA's user avatar
  • 9,625
-2 votes
1 answer
109 views

Fernet key must be 32 url-safe base64-encoded bytes - How to create a key for use with Fernet?

An example Fernet key The following code produces an example Fernet key, and reports that the length is 44. from cryptography.fernet import Fernet generated_key = Fernet.generate_key() print(f'...
user2138149's user avatar
0 votes
0 answers
36 views

How to sign <EncryptedAssertion> element using the STR-Transform algorithm in c#

In the SOAPEnvelope. I wants to signed the xml element 'EncryptedAssertion'. <EncryptedAssertion> <EncryptedData>....</EncryptedData> </EncryptedAssertion> using the ...
Lets Do Green's user avatar
1 vote
0 answers
135 views

AES encryption by JS can't be decrypted by PHP

Goal I am doing a proof of concept of a symmetric key encryption. A javascript code will send a AES encrypted string, which i want to decrypt via php. Attempt ON the client side, we have: <script ...
Sean's user avatar
  • 869
0 votes
0 answers
59 views

Evaluate the security of the message encryption extension

I created exrension for Firefox, but i'm not really sure about it's security. Can somebody help, how my program should store permanent keys? Now i keep them in local storage encrypted, but this ...
fromzero's user avatar
0 votes
1 answer
60 views

How to use an RSA key for Duende Identity Server v7

My thought process was: Create the RSA key in Azure Key Vault --> Keys Retrieve the key using KeyClient Pass the key to AddSigningCredential Here is the C# code string keyVaultUrl = Configuration....
Andrew Duffy's user avatar
0 votes
0 answers
38 views

Is there a limitation on the size of data (Key Material) that an AWS KMS Wrapping Key can encrypt?

I have a 4096-RSA Private key that I want to use as key material in AWS KMS to generate a KMS key. While setting up an external key in AWS KMS, it does not let us upload a Key Material directly for ...
Brijesh Patel's user avatar
-1 votes
0 answers
94 views

Performance in rust for secp256k1 private key to bitcoin address generation (Multi-Threading)

recently I stumbled upon the ~1000 BTC Bitcoin Challenge Transaction. So In my process of wanting to learn rust anyways, I tried to create a simple program which generates random numbers within a ...
Invisible Echo's user avatar
-2 votes
0 answers
44 views

How to connect the node extension

I am trying to use this code to connect directly to a gradient node (extension by mqtt). After trying to connect I always receive same message: < Received: WSMessage(type=<WSMsgType.CLOSE: 8>...
Rostyslav Rudyi's user avatar
0 votes
1 answer
135 views

How can encrypt\encode (Base64) for a generated key including secret message with 2nd public data key in Python?

I'm trying to encrypt the a new generated key using another public key belongs to my friend recipient_public_key, then encode the final output in Base64. This process also can be done step by step ...
Mario's user avatar
  • 1,962
1 vote
1 answer
34 views

Is there a way to securely transmit data (a TLS version) in 32 byte packets?

There are several cheap radio modules (nRF24L01 for example) that are only capable of transmitting a 32 byte packets. That is too small for including a HMAC computed with any modern protocol and an IV....
GiyomR1999's user avatar
0 votes
0 answers
50 views

try to understand OpenSSL EVP_DigestSign functions

I am still learning to use EVP_DigestSign functions (https://docs.openssl.org/master/man3/EVP_DigestSignInit/#description). One thing I feel puzzled is that the digest type is somehow restricted to ...
user180574's user avatar
  • 6,084
1 vote
0 answers
15 views

Configuring SSL/TLS encryption for data in transit - GridDB

I’m trying to configure secure data storage and retrieval using the GridDB database with TLS/SSL encryption for data in transit. I want to encrypt sensitive data before storing it and decrypt it upon ...
Hassan Ubaid's user avatar
1 vote
1 answer
90 views

Creating a PKCS#1 v2.1 signature with C#

I'm trying to port a reference implementation that signs a challenge using a PKCS#12 certificate from Java to C#. As far as I understand the reference, the signature should be a PKCS#1 v2.1 signature (...
BaerMitUmlaut's user avatar
-4 votes
1 answer
131 views

RSA decryption python [closed]

How to find p,q,a if they random? i have this script from Crypto.Util.number import getPrime p,q = getPrime(256), getPrime(256) n = p*q a = getPrime(128) c1 = (p-a)**2>>128 c2 = (q+a)**2>>...
joram's user avatar
  • 1
0 votes
0 answers
64 views

"error": "'NoneType' object has no attribute 'seek'" when trying to decode the message in the file

I've been working on a project that embeds ciphertext into a PNG file using LSB. My lsb_encode function works, the IV is correctly saved in the metadata (I've checked) and overall the file is usable. ...
Айдън Сезаиевв's user avatar
0 votes
1 answer
50 views

how to extract public key from auth data webauth in Rust and verify it?

i have stucked to extract the Auth Data from Webauth api attention into Public Key for this case i am using coset, openssl, ciborium to extract the public key and cose key here is how i implement to ...
notnuyy's user avatar
  • 115
-1 votes
1 answer
57 views

Generate all possible pairings of letters with no repetitions in javascript

I'm playing a game where an Enigma M3 cipher is being used. It isn't meant to be played this way, but I'm finding it fun. For the current clue, the plug board for the cipher isn't known. A plug board ...
klvs's user avatar
  • 1,177
0 votes
0 answers
51 views

Cannot decrypt private ED25519 key generated with cryptography Python module in ssh-keygen

1. Minimal Python code import os from stat import S_IRUSR from stat import S_IWUSR from cryptography.hazmat.primitives.asymmetric import ed25519 from cryptography.hazmat.primitives.serialization ...
davidcesarino's user avatar
0 votes
1 answer
111 views

Unpad/decode OAEP padded decrypted data

I decrypt a byte array on a smartcard and receive data back from the smartcard. This decrypted data is still in the OAEP padding. Is there a simple way in C# to "unpad" decrypted data? The ...
Max1829's user avatar
  • 11
1 vote
0 answers
117 views

Validating a Shopify Webhook

In Shopify, webhooks can be created for certain events that take place in the admin such as updating a product and they provide a note that says: Your webhooks will be signed with ...
dbzx10299's user avatar
  • 1,044

1
2 3 4 5
306