Questions tagged [public-key-encryption]

An cryptographic scheme which uses two mathematically related keys; a public and a private key where a message encrypted with public key can only be decrypted with the private key and vice-versa.

The most important element of public key encryption is that the public and private keys are related in such a way that only the public key can be used to encrypt a message and only the matching private key can be used to decrypt it. In addition, it is practically impossible to derive the private key with only the knowledge of the public key. Public-key systems such as PGP, SSL and many others benefit from this mathematically well-defined behavior of public key encryption. It is important to note that public key encryption is mostly called asymmetric encryption because it uses two keys instead of one key as opposed to symmetric encryption.

1918 questions
0
votes
0 answers

Encrypt 2 numbers preserving arithmetic correlation

I want to encrypt 2 numbers using a public key and have the reader know the correlation between those 2 numbers. I can also share the public key. Example: 22 => 785F3EC7EB32F30B90CD0FCF3657D388B5FF4297F2F9716FF66E9B69C05DDD09 95 =>…
0
votes
1 answer

Could stealing the private key compromise RSA security?

I am developing a windows desktop app where the clients applications need to download some data file from a public shared folder. in order to protect the data from tempering i would like to generate RSA private and public keys. keep the public key…
EKanadily
  • 3,831
  • 3
  • 35
  • 33
0
votes
0 answers

Converting a hex String to x509 encoding

I'm working with some Android Java code that uses ECDSA keys. The code compiles and runs fine, but has some logic errors during the verification process. I want to try using a constant key pair (that's known to be valid) to troubleshoot the…
0
votes
1 answer

Decryption failed: No secret key using GPG

Last night I setup Pass Password Manager. I used gpg2, and followed this tutorial. I didn't implement git integration. Everything worked successfully. To view my password I had to enter my master key, exactly like how I want it. This morning I try…
Suji
  • 767
  • 3
  • 12
  • 28
0
votes
1 answer

pgcrypto keeps visible the private key on the logs?

Somebody told me it could be possible if i use pgcrypto pgp_pub_decrypt() function with my queries the logs will reveal the secret key used to decrypt my data SELECT pgp_pub_decrypt(string_to_decrypt, private_key) I can not check that because i…
jacktrade
  • 3,125
  • 2
  • 36
  • 50
0
votes
2 answers

Securing a private key on disk using symmetric encryption in Java

I have a distributed application which polls for commands from a central server and the content of those commands are "signed" by a private key with the public key deployed along with the application at each remote site. Each command is signed with…
0
votes
1 answer

Encrypt a message using a public key in a file using openssl (virtualbox)

I have a question regarding the public key encryption. I have the public key of X and want to encrypt the message in the file message.txt using the public key of X stored in the file X.pub using openssl. I'm currently using virtualbox. I'm not sure…
0
votes
0 answers

how to find a and b in this function of the form f(p) = (a.p + b) mod 2, knowing that plain text + cipher text are given (Brute Force)

this is the question Breaking code Brute force is an important, and basic, algorithmic paradigm. In a brute-force algorithm, a problem is solved in the most straightforward manner based on the statement of the problem and the definitions of terms.…
0
votes
1 answer

Where to save client's public key and retrieve to encrypt data

I have a public key of customer that I need to use to encrypt credentials and send to the customer to obtain an auth token that I will be using for all further communication with the customer services. For testing purpose, I saved the public key…
0
votes
0 answers

base58 cannot get 34 chars results (as Bitcoin address does) but 68 chars

I am trying to convert public key hex to Bitcoin address. From this website http://gobittest.appspot.com/Address, I can do some test. For example, I have this public…
fluency03
  • 2,637
  • 7
  • 32
  • 62
0
votes
1 answer

Bouncy Castle CMS public key encryption

I'm following the example here: http://www.baeldung.com/java-bouncy-castle And I've got a couple of questions: public static byte[] encryptData(byte[] data, X509Certificate encryptionCertificate) throws CertificateEncodingException,…
rschlachter
  • 720
  • 1
  • 9
  • 20
0
votes
1 answer

My firebase chat app is not coming in the messaging app list of choices to send

I have made a firebase chat app for android platform. I have another have app to encrypt the text and send it using the other or third party apps by using intents. But when I click on the send button in the latter app, a list of apps appear to…
0
votes
1 answer

CertUtil | How CertUtil -verifykeys works internally?

I have a CA certificate in Local Machine Certificate Store. When I run this command - enter code here certutil -verifyKeys gives Key "KEYNAME" verifies as the public key for Certificate "KEYNAME" V0.0 Signature test FAILED CertUtil: -verifykeys…
User1234
  • 1,543
  • 4
  • 22
  • 32
0
votes
0 answers

Java SHA256 Signature using Public Key in Andorid (25)

I am writing an application targeting Android 25 and I am trying to sign my HTTP query parameter String by using my public key. However, I am getting the following exception java.security.SignatureException: object not initialized for signing when…
F. Aydemir
  • 2,665
  • 5
  • 40
  • 60
0
votes
0 answers

Can we call pfx file as a key store?

I have tried to find the difference between keystore and pfx file. But I coun't find the exact difference between. As per my understanding Keystore is a repository where we can store the bulk of certificates in encrypted format. So that no one can…