cryptography 177

  1. How do you use bcrypt for hashing passwords in PHP?
  2. Encrypt and decrypt a string in C#?
  3. Fundamental difference between Hashing and Encryption algorithms
  4. Java 256-bit AES Password-Based Encryption
  5. How are software license keys generated?
  6. Is “double hashing” a password less secure than just hashing it once?
  7. What data type to use for hashed password field and what length?
  8. Where do you store your salt strings?
  9. Is it possible to decrypt MD5 hashes?
  10. Failed to install Python Cryptography package with PIP and
  11. How does password salt help against a rainbow table attack?
  12. Difference between java.util.Random and
  13. Simplest two-way encryption using PHP
  14. Why are primes important in cryptography?
  15. How do you Encrypt and Decrypt a PHP String?
  16. Salting Your Password: Best Practices?
  17. Is SHA-1 secure for password storage?
  18. Which cryptographic hash function should I choose?
  19. Using AES encryption in C#
  20. Encrypt Password in Configuration Files?
  21. Why is XOR the default way to combine hashes?
  22. How to encrypt/decrypt data in php?
  23. Is calculating an MD5 hash less CPU intensive than SHA family functions?
  24. Can two different strings generate the same MD5 hash code?
  25. What RSA key length should I use for my SSL certificates?
  26. Given final block not properly padded
  27. Login without HTTPS, how to secure?
  28. Is it possible to get identical SHA1 hash?
  29. Padding is invalid and cannot be removed?
  30. Secure random numbers in javascript?
  31. Microsoft Crypto API Disable Use of RSAES-OAEP Key Transport Algorithm
  32. Storing passwords with Node.js and MongoDB
  33. MD5 hashing in Android
  34. How do I enable perfect forward secrecy by default on Apache?
  35. Why use the C# class System.Random at all instead of System.Security.Cryptography.RandomNumberGenerator?
  36. Generate SHA hash in C++ using OpenSSL library

  37. Using SHA1 and RSA with vs. MessageDigest and Cipher
  38. How to install cryptography on ubuntu?
  39. How does a cryptographically secure random number generator work?
  40. Did I understand /dev/urandom?
  41. What is the most secure seed for random number generation?
  42. What are optimal scrypt work factors?
  43. How to Generate Unique Public and Private Key via RSA
  44. What's the shortest pair of strings that causes an MD5 collision?
  45. Why is XOR used on Cryptography?
  46. How to create and use nonces
  47. .NET implementation of scrypt
  48. What exactly is a rainbow attack?
  49. How to read a PEM RSA private key from .NET
  50. Why No such provider: BC?