Questions tagged [encryption-symmetric]

A type of encryption where the same key is used to encrypt and decrypt the message.

Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet (known as the Caesar Cipher), or as complicated as the Advanced Encryption Standard, which is used in some modern cryptography. Anyone who knows the key can either encrypt or decrypt a message.

Note that symmetric encryption does not require that the encryption and decryption key be identical, but rather that both keys derive from the same knowledge. For example, a letter-shifting cipher might require that "A" be enciphered as "G" - the opposite operation would be needed to decrypt.

736 questions
3
votes
1 answer

Decrypting AES in SQL with key and IV

I have a project requirement where I need to encrypt/decrypt a string in my application (c#.net) using AES and a key/IV (initialization vector) that I provide. Easy enough. Where it gets a little more confusing is I also have a requirement that I…
3
votes
3 answers

How to convert AES_encrypt in counter mode to EVP interfaces?

I'm in the process of coding some stuff around common-encryption which require AES Ctr 128. So I'm digging a bit with crypto stuff. Currently I test a code (find here) which work (encrypt/decrypt a file): #include #include…
3
votes
0 answers

What is the proper way to handle key derivation on Android with libsodium?

I am trying to use libsodium for symmetric encryption on Android. In order to get libsodium on android, I am using this binding library. I am struggling to find the proper way to derive a key from a (low entropy/user chosen) password. There is…
Stephen
  • 4,041
  • 22
  • 39
3
votes
2 answers

Securing symmetric key

In my project (windows desktop application) I use symmetric key in order to encrypt/decrypt some configurations that need to be protected. The key is hardcoded in my code (C++). What are the risks that my key will be exposed by reverse engineering…
3
votes
2 answers

Why in brute force attack on Symmetric Algorithm there is 50 percent chance of finding the key after half of the attempts?

Any cryptography text mentions that in brute force attack on Symmetric Algorithm there is 50 percent chance of finding the key after half of the attempt. e.g. DES with 56 bit key would have 50% chance of finding the key after the first 255…
Anand Patel
  • 6,031
  • 11
  • 48
  • 67
3
votes
2 answers

Is this a secure encryption method

I'm writing an application for Android that uses symmetric key encryption to protect sensitive data. As far as I can tell, Android only directly supports "PBEWithMD5AndDES". How secure is this algorithm? Also, I've included my code below…
Peter Sutton
  • 1,145
  • 7
  • 20
3
votes
1 answer

How to encrypt Neo4j Database

I would like to encrypt Neo4j Database, so what I am doing, I used Eclipse to create the Neo4j database {Java API}, and I used AES 128-bit key, to encrypt the nodes' properties, How can I replace the properties for each node by encrypted ones…
nana
  • 59
  • 8
3
votes
3 answers

Differences between CAPICOM TripleDES and System.Security.Cryptography TripleDES

I'm trying to move away from using CAPICOM since I can no longer use it (64-bit Windows 7 machine). The existing code for using TripleDES is like this: EncryptedDataClass cryptic = new EncryptedDataClass(); cryptic.Algorithm.Name =…
Posthuma
  • 256
  • 1
  • 8
3
votes
1 answer

Using Jasypt for password based AES encryption with PBKDF2WithHmacSHA1 key

I'm implementing an encryption mechanism where I work, and the security guy's demands are as follows: Create a 256 bit key using PBKDF2WithHmacSHA512, secret password, 256bit salt and 20000 iterations minimum. Salt should be generated using…
Guy Marom
  • 166
  • 1
  • 9
3
votes
1 answer

Invalid property 'securementCallbackHandlers' in spring-ws 2.2.1

I Create Web service with spring-ws (Soap) and now, i want create encryption web service. my applicationContext.xml is:
emreh
  • 31
  • 1
3
votes
1 answer

nCipher Using KeySafe generated AES Key in java

We have a AES Key generated from KeySafe Utility provided by nCipher. How can we use this Key to encrypt data? Can we Create a KeyStore from the KeySafe generated Key? I have found sample by creating blank keystore and creating new key from java…
Sumit Modi
  • 33
  • 4
3
votes
1 answer

Migrating C# .Net encrypt/decrypt algorithm to Ruby

I have to encrypt/decrypt data from a .Net based web service that is using the following code (based on Rijndael algorithm): /** * Cifra una cadena texto con el algoritmo de Rijndael * * @param plainMessage mensaje plano (sin cifrar) *…
3
votes
2 answers

WM-Bus extended layer decoding

I am trying to decrypt wm-bus telegram from Kamstrup Multical21 in C1 mode with Extended Link Layer. The payload together with ELL info is following: 23 44 2D 2C 45 45 71 63 1B 16 8D 20 6A 31 FB 7C 20 39 A3 79 60 4B 90 BD FC BE 8D D8 CB 18 CE 77 DC…
Enmujnem
  • 31
  • 1
  • 3
3
votes
1 answer

AES / Rijndael Test Vectors : what padding mode?

So I've been looking at these test vectors for the Known Answer Test for AES / Rijndael (with 128-bit block) in CBC mode, and I wonder: what kind of padding do they use? PKCS7?
J. Polfer
  • 12,251
  • 10
  • 54
  • 83
3
votes
1 answer

Compare Encrypted Bank Account Details without full Decryption

I am building a database that stores employee information, including bank account details. The bank account details are stored so that we can check for current or past staff using our company, which in our case might be a reason to be concerned…