Questions tagged [public-key-encryption]

An cryptographic scheme which uses two mathematically related keys; a public and a private key where a message encrypted with public key can only be decrypted with the private key and vice-versa.

The most important element of public key encryption is that the public and private keys are related in such a way that only the public key can be used to encrypt a message and only the matching private key can be used to decrypt it. In addition, it is practically impossible to derive the private key with only the knowledge of the public key. Public-key systems such as PGP, SSL and many others benefit from this mathematically well-defined behavior of public key encryption. It is important to note that public key encryption is mostly called asymmetric encryption because it uses two keys instead of one key as opposed to symmetric encryption.

1918 questions
0
votes
1 answer

RSA Key encrypt and decrypt issue

I am trying to send a encrypted response to client's api using public key and trying to decrypt the response that comes out of the client using my private key. When i try to decrypt the message, it says "Key does not exist". Below are the codes that…
0
votes
3 answers

Can two users have the same private key? the same public key?

I was reading about the asymmetric key cryptography and got to know that it resolved the issue caused by symmetric key cryptography. (where the same key used for encryption and decryption and chances of stealing the key is higher). In asymmetric key…
Shubham
  • 1,163
  • 2
  • 12
  • 36
0
votes
2 answers

Authenticating without a database in nodejs

I am making a databaseless website on aws lambda. A user will be able to post a message. And if he has the right password (which will be a url like example.com/pageid/edit/passwordkey/) he will be able to edit the page too. I want to be able to…
chickens
  • 19,976
  • 6
  • 58
  • 55
0
votes
0 answers

Sending encrypted message through RSA over a local network using socket programming

I'm trying to send an encrypted message over a network using tcp/ip communication but an error occurred at the last step i.e the message is being send and after receiving at private decrypt the error occurred. Also this code runs completely ok when…
0
votes
1 answer

MAKECERT and duplicate Public Keys

I hope this question makes sense. But let's say I create a Certificate with MAKECERT.EXE like this: makecert -r -sr LocalMachine -ss my -a sha256 -sky exchange -n "CN=Hello World" Now let's say I run this on two different (Windows) machines.…
Neil Weicher
  • 2,370
  • 6
  • 34
  • 56
0
votes
0 answers

Spring Cloud 1.4.2 Edgware.SR2 config decryption is not happening on client side

I used this project from spring.io and added asymmetric encryption and decryption by having below property files. application properties (server side) : server.port=8888 …
0
votes
1 answer

Asymmetric key authentication

I have an application running as user 'U' that accesses multiple web services (hosted on different web servers) S1, S2, etc. I want a secured way to authenticate the User 'U' on all the services S1, S2 etc. I have control over both the application…
0
votes
1 answer

TPM Windows Key creation

Once Windows has taken ownership of the TPM chip inside my computer is it still possible to create a persistent key inside it ? (Given that I don't have the Owner Password because Windows throws it aways after initializing the TPM). Is the Storage…
b3nj1
  • 667
  • 1
  • 6
  • 17
0
votes
0 answers

RSA 512 bit implementation in android with NO PADDING

My question is that on how to use RSA 512 bit in Android; I was able to generate the public and private keys by looking up on the internet but not sure if its with NO padding as I could not find any solution for it.The public key would be sent to…
0
votes
1 answer

Crypto: Valid key?

Consider this scenario: Alice sends a signed message with her key to BOB. Bob never traded a key with Alice. Alice's key is signed by a certain X. X's key is signed by Y, an entity that BOB trusts. Is Alice's key valid or not for Bob?
Meelamri
  • 27
  • 6
0
votes
1 answer

RSA algorithm on swift and java

I need to generate public/private key for RSA algorithm on IOS device and send public key to server with encrypted text. Server must read public key and decrypt user message. I have code on swift: func generateKeys(){ var publicKey: SecKey? …
Crazy Chef
  • 56
  • 7
0
votes
0 answers

PyCrypto encryption/decryption error client/server and CHIL engine

I have two sides: one or more clients, running Python 2.7.10, Pycrypto 2.6.1 one server, running the same all running on: django 1.11.2, Centos 6.9, OpenSSL 1.0.1e-fips the server holds an HSM-backed private key and the corresponding public…
Hal
  • 537
  • 4
  • 13
0
votes
0 answers

Digital certificates in https vs device

I am new to digital certificates and it's various types and applications. What I know/assume as of now is in https communication, a CA will issue a certificate which will basically contain a public-private key pair which the Server and Client will…
0
votes
1 answer

Apache WSS4J - How to load a key store password from database

In order to provide key store information we have store-password in plain text file. To secure the key store either we need to encrypt the store password or move them in db. Is there any way to access this key store information from Database during…
0
votes
1 answer

Use public key string to decrypt in PHP

I have the public key string: -----BEGIN PUBLIC KEY----- MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvL+UegLeWJ1KLh6WEfbW kGcA+vj4G/k6iIz9OWCb9t3maokH+Oz/bNB8PGlwmH2aCBmqXPv9p3hexcujUsNC…
no nein
  • 631
  • 3
  • 10
  • 27