Questions tagged [public-key-encryption]

An cryptographic scheme which uses two mathematically related keys; a public and a private key where a message encrypted with public key can only be decrypted with the private key and vice-versa.

The most important element of public key encryption is that the public and private keys are related in such a way that only the public key can be used to encrypt a message and only the matching private key can be used to decrypt it. In addition, it is practically impossible to derive the private key with only the knowledge of the public key. Public-key systems such as PGP, SSL and many others benefit from this mathematically well-defined behavior of public key encryption. It is important to note that public key encryption is mostly called asymmetric encryption because it uses two keys instead of one key as opposed to symmetric encryption.

1918 questions
0
votes
1 answer

Serial number generation algorithm for C# application

I am developing a shareware c# application which accepts a serial key generated in my website. I am following the following approach suggested by Joseph Spiros You bundle your public key with the application. When the user buys the application,…
John T.Emmatty
  • 143
  • 3
  • 8
0
votes
0 answers

PGP encryption for the server based app

Here is context: I am using PGP to encrypt messages in a chat web app. After going through some articles, I get brief idea how PGP works and here is how I am doing it with openPGPJs : Client(web browser) generate the public/private key-pairs and…
Suraj
  • 1,625
  • 1
  • 15
  • 33
0
votes
1 answer

ssh (and git) authentication issues on external port/ip (local ip works fine)

I am trying to set up a git repository on a server machine that is remote-accessible over the internet. I have succeeded in getting git working over local/internal IP addresses. Within local LAN, I have private-key-based authentication working for…
C R
  • 25
  • 1
  • 6
0
votes
3 answers

what is file verification system for php project or licence checking the configuration files

My colleague asked me a question like "license check to config file". when i searched i got this http://www.google.com/search?q=file+verification+system&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a and in the result i got…
Jayapal Chandran
  • 10,600
  • 14
  • 66
  • 91
0
votes
1 answer

.NET - Porting RSACryptoServiceProvider to CNG for signing data

I'm trying to port an RSA signing function written in C#, from the (relatively easy to use) RSACryptoServiceProvider.SignHash method, to the CNG API, in order to use a specific cryptographic service provider. This is the original (before porting)…
fernacolo
  • 7,012
  • 5
  • 40
  • 61
0
votes
0 answers

My EC2 instance generates a keypair but unable to download into my downloads folder

I have launched ec2 instance successfully and created a new keypair. However, it is not in my downloads folder I only get to see the old keypair for the previous downloaded. I'm new to the ssh business side of things. it is driving me nuts. any help…
0
votes
2 answers

Make the publicKey Object from the loaded certificate

I have a certificate which I would like to use to encrypte some message. Now I am trying to load certificate from the file but I do not know how to create the PublicKey object. I want to create it use this methode to encrypte it. I downloaded the…
benz
  • 693
  • 1
  • 9
  • 29
0
votes
3 answers

How to read public key from PFX file in java

I am able to read private key from PFX file but not public key. I am using following code to read public key. InputStream inStream = new FileInputStream(certFile); CertificateFactory cf = CertificateFactory.getInstance("X.509");…
0
votes
0 answers

Validate if URL is coming from a trusted source

We are working on a redirecting page for our mobile apps. Users would go to a page like: https://mobileredirect.our-app.com?target=https://clientdomain.com/some_resource Mobile apps on iOS and Adroid can intercept the "mobileredirect.our-app.com"…
0
votes
1 answer

Google IAP Public Keys Expiry?

This page provides public keys to decrypt headers from Google's Identity Aware Proxy. Making a request to the page provides its own set of headers, one of which is Expires (it contains a datetime). What does the expiration date actually mean? I…
0
votes
1 answer

Create authorized keys from ECDSA public key

I'm using Bouncy Castle API and I have ECPublicKey object but I'm not sure exactly how to construct a OpenSSH authorized key from there. I don't know what the format looks like. I'm thinking my solution would be similar to how it's done for RSA and…
0
votes
0 answers

Is storing a private key possible to be secure?

This question is about a project of mine. I have a server-side application running on my Raspberry Pi, while the client-side application is supposed to be distributed on all my other devices. The following exzerpt is showing the code of the…
IchBinGrumpig
  • 119
  • 1
  • 1
  • 10
0
votes
0 answers

Public private key signing/encoding

I'm stuck trying to base64 encode a public private key. It looks like I can encode public and private keys separately with the SwiftyRSA library. My problem is that I can't put them together the way the API JWT assertion should look (in RS256). I've…
Bennybear
  • 335
  • 2
  • 13
0
votes
1 answer

Encryption and Decryption with the help of Certificate public Private key

I want to create certificate with public and private key. Then I want to extract public key from it and with the help of public key I want to encrypt data. On the receiver side I want to decrypt data. How can i create required certificate? Sample…
0
votes
0 answers

Retrieve public key by providing KeyID for encryption

Can I retrieve public key by providing keyID.( I have imported the public key using kleopatra) Note: I am currently passing the public key file path to encrypt the stream.I am successfully encrypting the stream without any issues using…
user2526236
  • 1,538
  • 2
  • 15
  • 29
1 2 3
99
100