Questions tagged [encryption-asymmetric]

A type of encryption which uses one key to encrypt a message and another to decrypt the message.

In asymmetric encryption, also referred as public-key cryptography, there are two related keys--a key pair. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it.

594 questions
0
votes
1 answer

how to prevent a malicious attack from an unknown person when he knows the public key of my asymmetric key encryption architectural system?

I am using asymmetric encryption algorithm in my web application. The loophole is if some unauthorized person comes to know my public key , then he could make a malicious WebService call. How can I prevent this?
0
votes
1 answer

How many times can AesCryptoServiceProvider.GenerateIV be safely called before exhausting the number of unique IVs?

I am confused. According to the below my IV "MUST" be unique for every round of encryption. Properties of an IV depend on the cryptographic scheme used. A basic requirement is uniqueness, which means that no IV may be reused under the same key.…
0
votes
1 answer

Implementing Asymmetric encryption for Objective C using Truststore

I'm trying to do an encryption method for ios mobile platform(Objective C) which on android(Java) is using this method Need guidance on how to apply that method for ios. Am not very sure on how to port it to xcode to use it. Thanks in advance :)
Kar Wai
  • 121
  • 1
  • 12
0
votes
1 answer

Handling security when deploying Java application

I have a Java app (deployed as a JAR file) that allows file sharing through SLLSockets. If all users use the same certificate, file transfers are not secure, since it violates the core concept of asymmetric encrypted communication. Therefore, I…
user3856210
  • 270
  • 2
  • 12
0
votes
1 answer

iOS 5.0 : generated x509 rsa public key of size 2048 is 270 bytes instead of 294 bytes. Why?

I am developing an sdk for iOS 5 at work, and I am communicating with a device via a socket interface. This device requires to be sent a base64 encoded rsa x509 public key of size 2048. I generate the key pair with the following code: OSStatus…
0
votes
3 answers

Request processing failed; nested exception is javax.crypto.BadPaddingException: Decryption error

I am trying to share a symmetric key encrypted with Asymmetric encryption, between two users in a spring web application. But I am getting the error javax.crypto.BadPaddingException. Here is detail of problem. In one controller method I am using…
0
votes
1 answer

Symmetric and public key encryption

Suppose N people want to communicate with each of N- 1 other people using symmetric key encryption. All communication between any two people, i and j, is visible to all other people in this group of N, and no other person in this group should be…
0
votes
2 answers

Random function in Javascript considered insecure. Does it really matter?

I am writing some code that shall run in a browser, which uses Javascript random function(s) for key generation. Now reading in several forums that this is considered to be not secure, due to bad random number generation. Now, what if I only create…
0
votes
0 answers

Comparison of digitally signed string

Is it possible to digitally sign a string (Using JCA) and then compare the same by creating another string which is digitally signed as the previous one. Scenario: I have a product details which needs to be digitally signed (using JCA or any other…
souashokraj
  • 81
  • 1
  • 1
  • 4
0
votes
2 answers

Do public keys HAVE to be used used to encrypt?

My question is: Does the public key in a asymmetric key have to be used to encrypt data or can it go either way (be used to decrypt)?
munchschair
  • 1,593
  • 3
  • 19
  • 43
0
votes
1 answer

Sql server asymmetric key decryption to Nvarchar issue

I am facing a problem with data encryption and decryption in sql, below is the scenario I tried. •Created table(@TABLE) with columns type NVARCHAR(MAX).(Trying to encrypt FirstName, LastName, MiddleName, Country, TIN) •Created stored procedure to…
0
votes
0 answers

Using ECDSA instead of RSA for encrypting and decrypting integer

I want to use ECDSA instead of RSA for encrypting and decrypting integer number. Ususally ECDSA is used for digital signature. But it's possible to transform algorthm of digital signature: use signature generation for decryption, signature…
0
votes
1 answer

ed25519 ECDH encryption possible and safe?

As far as I can see everybody use curve25519 for public/private encryption (ECDH) and ed25519 for signing (ECDSA). This creates double size of keys or some special conversion tricks that may not be safe: https://github.com/dchest/ed2curve-js Is it…
0
votes
1 answer

CryptoAPI - how to extract RSA public key from private

Using windows CryptoAPI, is it possible to get public RSA key from a private key which was imported (not generated)? If I use CryptGenKey, I can call CryptExportPublicKeyInfo and CryptImportPublicKeyInfo to obtain the public key handle. However,…
Alex
  • 5,159
  • 4
  • 25
  • 33
0
votes
2 answers

OpenSSL public key decrypts file?

My understanding is that the public key can be used for encryption and the private for decryption and that the public key cannot decrypt the file encrypted by the same public key. Did I misunderstand or am I doing something incorrectly? 1) generate…