Questions tagged [secret-key]

A secret key is a piece of data that is known by a limited number of users / programs and that participates in protecting information (or access to the information). Unlike passwords which are meant to be input by users and verified by matching, secret keys are usually read from storage and are an active part of an algorithm to decrypt the protected information. Use this tag for questions related to the creation, storage and usage of secret keys.

A secret key is a piece of data that is known by a limited number of users / programs and that participates in protecting information (or access to the information).

Unlike which are meant to be input by users and verified by matching, secret keys are usually read from storage and are an active part of an algorithm to decrypt the protected information.

The secret key can be used both to encrypt and decrypt the information, in which case only the owners of the secret key can communicate to each other; or it can be used in association with a , in which case anyone can encrypt data that can then be read only by the owners of the secret key.

Use this tag for questions related to the creation, storage and usage of secret keys.

632 questions
-1
votes
1 answer

REST SECURE SECRET KEY

I am writing a JAVA REST webservice, I'm trying to understand how it all works, but I've managed to make simple methods where my client will send a JSON with information, and the server does something with it. Very easy. So what I am doing: My…
runefist
  • 543
  • 1
  • 8
  • 19
-1
votes
1 answer

Encrypting Messages using secret key larger then the Key Size

In order to encrypt messages larger than the key size (with secret keys), one needs to run the encryption operation separately over key size chunks of the message. Is this statement True or False?
BogusJoe
  • 1
  • 1
-1
votes
1 answer

Implementing secret key in qr code

How to implement secret key in QR Code so that the scanner will recognize that 'yeah, this is my code' (something like that). I already search for the algorithm but i can't find it.
-1
votes
1 answer

AES key storage management and salting in Python

I am fairly new to data security implementation. I am writing a Python code that needs to encrypt clear text data. Currently, I am using the following AES encryption implementation to encrypt the…
-1
votes
1 answer

Facebook desktop application access token

i'm developing a desktop solution ( c# ),that can access facebook throuhgh facebook sdk .NET, actually I can't understand how to obtain an access token using the facebook sdk or graph api, any suggestion ? Thank you in advance
Mirko Arcese
  • 5,133
  • 2
  • 13
  • 11
-1
votes
1 answer

How can I calculate the SHA -1 hash of a string with a secret key in Android?

Currently I am working on SHA-1 Hash Algoritham can any one suggest me how can such algo be developed using the secret key? Thanks :-) Similar question : How can I calculate the SHA-256 hash of a string with a secret key in Android?. Thanks.
Swift
  • 829
  • 2
  • 12
  • 33
-1
votes
1 answer

Sessions with Flask (python)

I'm on a project with Flask and I would like to create a session when the user is logging in. I follow the documentation but my script doesn't work and close directly after the opening. So, no way to launch my project in my browser. My code is the…
DescampsAu
  • 1,056
  • 2
  • 10
  • 29
-2
votes
1 answer

how to overcome No secret key error in git?

While using commit in VSCode I'm getting a NO SECRET KEY error. As I'm trying to commit the changes and trying to push the changes to my GitHub repository I'm getting a NO SECRET KEY error. How can I fix it?
-2
votes
3 answers

Where does "kubectl create secret generic NAME [--from-literal=key1=value1]" save it's result?

I am just wondering to know what is the result of running the following command? kubectl create secret generic NAME [--from-literal=key1=value1] Should we run it inside a specific file of the project? Where does it save the result of running this…
GoodMan
  • 542
  • 6
  • 19
-2
votes
3 answers

Why hide a django secret key?

I wanted to ask, why should I hide the secret key in a Django application? Why not just commit it to public source control? I understand the effects of an attacker finding out the secret key (from here). But if I just upload the code to github and…
-2
votes
1 answer

R shiny: Add Konami Code inside a Shiny App

Bonjour! I wonder how to "easily" implemant the Konami code in any R shiny app INPUT (from user keyboard on the R shiny app page) Arrow UP, UP, DOWN, DOWN , LEFT, RIGHT, LEFT, RIGHT, B, A OUTPUT - Add a fun image on the dashboard (- Change color of…
S.Br
  • 33
  • 4
-2
votes
1 answer

Vernam Cipher shared secret key

A and B share the secret key K. They agree the following protocol for the instigator of communication between them to authenticate the receiver when communicating over an insecure channel. The instigator encrypts a random number, R, the same length…
user1977884
  • 17
  • 1
  • 2
-3
votes
0 answers

How to pass environment variables set via a custom script in VS Code?

Ok, now I am in Visual Studio wrote a script that responds to two commands: build build ~ Builds the code build run ~ Runs the code How do I set these as a workflow so they run when I press shortcuts I don't want to setup key bindings, it's like…
eguneys
  • 6,028
  • 7
  • 31
  • 63
-3
votes
2 answers

How to properly recreate SecretKey from string

I'm trying to make an encryption-decryption app. I've got two classes - one with functions to generate the key, encrypt and decrypt, second one for JavaFX GUI. In the GUI class I've got 4 textareas: 1st to write text to encrypt, 2nd for encrypted…
zygmunt
  • 1
  • 1
  • 5
-3
votes
1 answer

protect my API from being used by others

I am writing a mobile app, and its corresponding RESTful API in NodeJS. Is it possible to make my RESTful API only usable from my app? I have done some research, and found posts like this. But it is kinda irrelevant to my needs.
onemach
  • 4,265
  • 6
  • 34
  • 52
1 2 3
42
43