cryptography 270

  1. How do you use bcrypt for hashing passwords in PHP?
  2. Encrypt and decrypt a string
  3. Fundamental difference between Hashing and Encryption algorithms
  4. Java 256-bit AES Password-Based Encryption
  5. How are Software License Keys generated?
  6. Is “double hashing” a password less secure than just hashing it once?
  7. Where do you store your salt strings?
  8. What data type to use for hashed password field and what length?
  9. Failed to install Python Cryptography package with PIP and
  10. Is it possible to decrypt md5 hashes?
  11. How does password salt help against a rainbow table attack?
  12. Difference between java.util.Random and
  13. Simplest two-way encryption using PHP
  14. Why are primes important in cryptography?
  15. Salting Your Password: Best Practices?
  16. Is SHA-1 secure for password storage?
  17. How do you Encrypt and Decrypt a PHP String?
  18. Which cryptographic hash function should I choose?
  19. Using AES encryption in C#
  20. Why is XOR the default way to combine hashes?
  21. Encrypt Password in Configuration Files?
  22. How to encrypt/decrypt data in php?
  23. Non-random salt for password hashes
  24. Microsoft Crypto API Disable Use of RSAES-OAEP Key Transport Algorithm
  25. Generate SHA hash in C++ using OpenSSL library
  26. Using SHA1 and RSA with vs. MessageDigest and Cipher
  27. Why use the C# class System.Random at all instead of System.Security.Cryptography.RandomNumberGenerator?
  28. Why do people use bouncycastle instead of Java's built in JCE provider? What is the difference?
  29. .NET implementation of scrypt
  30. How to create and use nonces
  31. How to read a PEM RSA private key from .NET
  32. Should I use an initialization vector (IV) along with my encryption?
  33. How would you keep secret data secret in an iPhone application?
  34. Many hash iterations: append salt every time?
  35. Private key length bytes
  36. PHP AES encrypt / decrypt
  37. What does a circled plus mean?
  38. How to decrypt SHA-256 encrypted String?
  39. Android 4.2 broke my encrypt/decrypt code and the provided solutions don't work
  40. Recommended Python cryptographic module?
  41. xkcd: Externalities
  42. How do you verify an RSA SHA1 signature in Python?
  43. How does being able to factor large numbers determine the security of popular encryption algorithms?
  44. Java: How to create SHA-1 for a file?
  45. How to generate Rijndael KEY and IV using a passphrase?
  46. How can I list the available Cipher algorithms?
  47. Correct way to sign and verify signature using bouncycastle
  48. Using ECC Curve25519 to encrypt/decrypt data in Java
  49. What is the difference between a randomly generated number and secure randomly generated number?
  50. Code Signing Certificate Options