Questions tagged [encryption-symmetric]

A type of encryption where the same key is used to encrypt and decrypt the message.

Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet (known as the Caesar Cipher), or as complicated as the Advanced Encryption Standard, which is used in some modern cryptography. Anyone who knows the key can either encrypt or decrypt a message.

Note that symmetric encryption does not require that the encryption and decryption key be identical, but rather that both keys derive from the same knowledge. For example, a letter-shifting cipher might require that "A" be enciphered as "G" - the opposite operation would be needed to decrypt.

736 questions
0
votes
1 answer

ASP.net MachineKey.Encode Changing Machine Key

The new MachineKey.Encode/MachineKey.Decode features in .Net seem to make encryption much easier. My question is, in the event that you need to modify your MachineKey on a routine basis, does it need to be a 3 step process? Decrypt and store…
Sam
  • 9,933
  • 12
  • 68
  • 104
0
votes
1 answer

How to implement "AES/CFB/NoPadding" Encryption/Decryption in WinRT C#?

We are porting the existing code to Windows 8 now, the data file downloaded from the server is encrypted in "AES/CFB/NoPadding", and we cannot change the data encryption mode because the data file is used by a lot of existing clients. In WinRT ,…
hxu
  • 46
  • 6
0
votes
1 answer

Using Symmetric Keys with SQL Server on 2 different servers

Does anyone know if a field encrypted with an Symmetric key would be the exact same output on different servers given the same cert master key and key credentials? I want to do a bulk copy from dev to test servers and want to know if the encryption…
dbinott
  • 911
  • 1
  • 11
  • 36
0
votes
1 answer

RsaProtectedConfigurationProvider implementation vs RSACryptoServiceProvider c#

If RSACryptoServiceProvider cannot Encrypt data larger than it's KeySize, how RsaProtectedConfigurationProvider is implemented in the .Net framework? I am working on a utility that is going to be used to encrypt/decrypt some sensitive information.…
gmaran23
  • 2,118
  • 2
  • 17
  • 18
0
votes
1 answer

GPG Symmetric - Database

I am a beginner in GNU PGP security stuff. I am trying to learn a few things. For example, if I take the Symmetric key for a particular file blah gpg --symmetric --no-use-agent "$blah" it now tells me to enter secret key/password. After entering…
user1524529
  • 897
  • 3
  • 10
  • 12
0
votes
1 answer

Is it necessary to use Initialization Vector at the time of Encryption and Decryption?

I am newbie to C# and I have a task to encrypt the files in C# and put it onto server (Mentioned that use 256-bit AES encryption). Whoever wants it, they should Decrypt it first and then use it. But I have some doubts related to it as: I am using…
Bhavesh Shah
  • 3,299
  • 11
  • 49
  • 73
0
votes
3 answers

In AES encryption, does the number of Iterations really add more security?

Im using AES and a salt String to encrypt my 'passwords', using a java program I made. (It uses AES symmetric encryption) The user sets the message to be encrypted, the salt, the iterations, and 16 bytes for the key. If i set it to use a high…
Primm
  • 1,347
  • 4
  • 19
  • 32
0
votes
1 answer

Is the same key derived providing the same salt and password using Rfc2898DeriveBytes

I read this tutorial about encryption in .NET it uses Rfc2898DeriveBytes to create a random key to be used by symmetric algorithm . but it doesn't save the key . and later in decryption method it supplies the same password and salt and decrypts the…
mohsen dorparasti
  • 8,107
  • 7
  • 41
  • 61
0
votes
3 answers

How to avoid AESManaged (C#) "Length of the data to decrypt is invalid."

I am using "AesManaged" for encryption and decryption of protected data in web application. in my scenario, i am creating a token based on "Email + CurrentDate" when user login, and send it in encrypted format back to the user(Encryption is done…
aamir sajjad
  • 3,019
  • 1
  • 27
  • 26
-1
votes
5 answers

Two way encryption in php

I need to do a 2-way encryption in PHP. Basically what I want to do is convert a string(Marshall for example) to something weird(s2323sdavrt44 for example) and then convert that (s2323sdavrt44) back to clear text string(Marshall). How can I achieve…
-1
votes
1 answer

Is AES in GCM mode still safe to use? And is there an even better solution to encrypt important data?

I have been searching the Internet for a good solution to securely encrypt my data, but I couldn't really find anything about it. I would like to have a strong encryption of the data, like in password managers or similar. I have come across a few…
Trexic
  • 1
-1
votes
1 answer

Is CryptoJS.AES ironclad by using a random 256 bit string (one time use)?

I'd like to store a secret on my server securely, and permanently. Before storing it, I would run the following code: import CryptoJS from 'crypto-js'; const SECRET = 'secret'; const key = CryptoJS.SHA256(rollHeadOnKeyboard()); const encrypted =…
-1
votes
1 answer

I have a python error with the cryptography library. Fernet.decrypt() missing 1 required positional argument: 'token'

I am experimenting with the cryptography library in python. I am getting this error: Fernet.decrypt() missing 1 required positional argument: 'token' This error came up while I was trying to decrypt the files. I do not no how to fix this, any…
-1
votes
1 answer

is there any Cryptographic loop function that returns first input?

I want to use cryptographic function that returns the initial input or something related to it like its hash, the function should work like Encrypting some data, then Encrypt the output of the data, and encrypt it again another time, and the loop…
-1
votes
1 answer

Symmetric key in the request body of the http request

I am getting the symkey followed by the encoded value in the one of the request body while recording a UI flow in jmeter. Is there a way to decipher this as my request fails after sometime and I get public key in the response.