Questions tagged [public-key-encryption]

An cryptographic scheme which uses two mathematically related keys; a public and a private key where a message encrypted with public key can only be decrypted with the private key and vice-versa.

The most important element of public key encryption is that the public and private keys are related in such a way that only the public key can be used to encrypt a message and only the matching private key can be used to decrypt it. In addition, it is practically impossible to derive the private key with only the knowledge of the public key. Public-key systems such as PGP, SSL and many others benefit from this mathematically well-defined behavior of public key encryption. It is important to note that public key encryption is mostly called asymmetric encryption because it uses two keys instead of one key as opposed to symmetric encryption.

1918 questions
0
votes
1 answer

Can fragments of encrypted data be decrypted?

Assume I encrypt byte array A, resulting in encrypted byte array E. I next split E into two smaller arrays, E1 and E2. If I ONLY have either E1 and E2, can they be decrypted, or do both E1 AND E2 need to be present, in the correct sequence, in order…
arosca
  • 469
  • 7
  • 15
0
votes
1 answer

crypto.createECDH is not getting added with webpack

I want to use createECDH function provided by crypto module in nodejs. I downloaded all the dependencies. Webpack does not add createECDH function in my resultant javascript files. How to use createECDH function of crypto available in node. it adds…
0
votes
1 answer

Which key is used for encryption of already sent and stored encrypted e-mails?

I would like to understand how e-mail encryption works. If I want to store my already sent encrypted e-mails, are they encrypted by my public key or private key? And which key is used to sign those messages?
BB-8
  • 565
  • 2
  • 9
  • 18
0
votes
1 answer

Can SSL key pair only be used on host where key was generated?

I note that when I use ssh-keygen to generate a public/private key pair, the public key file includes details of the user name and host on which the key was generated. Does this mean that this pair can only be used when communicating from this host?…
Andy
  • 523
  • 6
  • 20
0
votes
1 answer

How do I use an already given private key as a private key resource in PHP?

I am working on integrating the Walmart API. They require a digital signature with each API call. My code seems to be working up until I have to deal with the private key. Here is my function to generate a digital signature: //Most of this code is…
0
votes
0 answers

Converting public key type to big int

I'm trying to convert my key to a big integer or string in order to take the value of the key. I am currently attempting to convert it to string, where I used String keyAsString =…
Jeugasce
  • 197
  • 1
  • 3
  • 11
0
votes
1 answer

Express Can Use .pfx file with encrypted private key without the private key's password

I have an express instance and an unencrypted pfx which contains my cert and an encrypted private key. When I load the pfx in express, I do not need to provide any sort of password, and it works. How is the node.js instance getting access to the…
nickanna_42
  • 169
  • 12
0
votes
1 answer

Issues in importing a certificate to Spring

I want to hit the REST endpoints of a Server, say xyz.com. They have provided certificates in PEM format which I should be including in my application while connecting to their endpoints. My application is written on Spring Framework and I need to…
Akeshwar Jha
  • 4,516
  • 8
  • 52
  • 91
0
votes
0 answers

How to Decrypt Encrypted UPD Client Data?

I am building a UPD Server and I've already hooked the game client up to it and im now receiving data. The only problem is that the client data I'm receiving looks encrypted (I found the game has a public key and needs it). I am just wondering what…
0
votes
1 answer

does changing the md5 hash change the outcome of a digital signature?

From my understanding you need a hash in order to generate a digital signature, so if you change the hash of a EXE or program using a hash changer(not encrypter) of some sort, the digital signature will change? my head: DATA/SOURCE --> HASH --> SOME…
0
votes
2 answers

Restricting access of a Web application using public key/ private key techniques

I have a requirement of restricting access of a web application (public url available on www) & allowing it to specified set of clients. Application details as follows: Technology Used – JSP / Java EE Deployed on – IBM Webshpere My problems…
0
votes
1 answer

java data Encryption/Decryption : Encryption key to be with the tool owner not with developers

I have created java encryption/decryption methods using good encryption algorithms and we are using both functionalities in our application .These methods are working based on encryption key(string). As a developer I can see the encryption key in…
NIKHIL K A
  • 328
  • 5
  • 16
0
votes
1 answer

Openssl cannot decrypt message using PuttyGen private key

I've created public and private keys using PuttyGen then the public key was used to encrypt a message. I am now trying to decrypt such message using the private key with the following command: echo [my encrypted message] | openssl enc -d -base64 -A…
algiogia
  • 936
  • 2
  • 14
  • 40
0
votes
0 answers

Ad-Hoc SSL in Angular (and backend)

Most of the frontend web frameworks are just a few years old, and are rapidly changing. Are there any recent JS packages or libraries that do SSL very well? It can cost quite a bit of money to enable SSL with cloud hosting platforms, registrars,…
0
votes
1 answer

Update/Delete Certificate chain: Cannot assign the key to the given alias

I want to update my previous self-signed certificate with new one eg: chains which is returned (signed CSR) from TEST CA. My default keystore is: Windows-MY Step 1: I have created a private-public key pair, self-signed certifcate and CSR(private…
1 2 3
99
100