One thing that always strikes me as a non-cryptographer: Why is it so important to use prime numbers? What makes them so special in cryptography? Does anyone have a...
My team got handed over some server side code (in Java) that generates random tokens and I have a question regarding the same – The purpose of these tokens...
I’m having some trouble understanding the purpose of a salt to a password. It’s my understanding that the primary use is to hamper a rainbow table attack. However, the...
How can I hash some string with sha256 in Java? 16 Answers 16
What is the simplest way of doing two way encryption in common PHP installs? I need to be able to encrypt data with a string key, and use the...
What I mean is: Original String + Salt or Key --> Encrypted String Encrypted String + Salt or Key --> Decrypted (Original String) Maybe something like: "hello world!" +...
Someone told me that he has seen software systems that: retrieve MD5 encrypted passwords from other systems; decrypt the encrypted passwords and store the passwords in the database of...
I’ve always used a proper per-entry salt string when hashing passwords for database storage. For my needs, storing the salt in the DB next to the hashed password has...
I’m not sure how password hashing works (will be implementing it later), but need to create database schema now. I’m thinking of limiting passwords to 4-20 characters, but as...
When I try to install the Cryptography package for Python through either pip install cryptography or by downloading the package from their site and running python setup.py, I get...