Questions tagged [encryption]

For questions about encryption and decryption of data, which is the process of encoding data in such a way that adversaries cannot read or tamper with it. Technical questions about encryption (e.g. how does algorithm X work?) are off-topic but might be in scope for our sister sites about Information Security and/or Cryptography.

For questions about encryption and decryption of data, which is the process of encoding data in such a way that adversaries cannot read or tamper with it.

Technical questions about encryption (e.g. how does algorithm X work?) are off-topic but might be in scope for our sister sites Information Security Stack Exchange and/or Cryptography.

140 questions
77
votes
15 answers

Why should passwords be encrypted if they are being stored in a secure database?

I have a web service. Right now, I have passwords stored in plain text in a MySQL table on my server. I know this isn't the best practice, and that is why I am working on it. Why should passwords be encrypted if they are being stored in a secure…
phpmysqlguy
  • 795
  • 1
  • 8
  • 5
45
votes
13 answers

Encrypted content in games

I have been having this idea of using encryption to prevent users from figuring out content in my program outside of the program itself. Like users may find textures never used in the game meant to be part of some kind of Easter egg while going…
Christer
  • 624
  • 1
  • 5
  • 10
29
votes
7 answers

Is there any algorithm pattern to protect any content in the web to ensure I am the first one who created it?

A few years ago there was this hacker (don't remember who he was) that full disclosed a vulnerability in a given system, but to make sure nobody took credit for that, he created some kind of PGP key. What I understood at the time is that he created…
29
votes
4 answers

Zero-knowledge code hosting?

In light of recent revelations about widespread government monitoring of data stored by online service providers, zero-knowledge services are all the rage now. A zero-knowledge service is one where all data is stored encrypted with a key that is not…
23
votes
4 answers

Is this simple XOR encrypted communication absolutely secure?

Say Alice and Peter each have a 4GB USB flash memory stick. They meet and save on both sticks two files named alice_to_peter.key (2GB) and peter_to_alice.key (2GB) which contain randomly generated bits. They never meet again, but communicate…
user3123061
  • 1,609
  • 1
  • 15
  • 17
22
votes
7 answers

Should I encrypt data in database?

I have a client, for which I'm going to do an Web application about patient care, managing patients, consults, history, calendars, everything about that basically. The problem is that this is sensitive data, patient history and such. The client…
Tio
  • 481
  • 1
  • 3
  • 10
21
votes
4 answers

Programmers' concerns about export restrictions from the United States

Which aspects do I need to consider when designing and publishing software that must meet the US export restrictions for cryptographic software? Wikipedia says that there are various categories which you can assign to cryptographic software. And the…
caw
  • 215
  • 2
  • 10
15
votes
6 answers

How to assure users that website and passwords are secure

On reliable websites I always see claims such as "All data is encrypted" or "All passwords are encrypted using 128bit encryption" and etc. However I have never come across a claim such as "All passwords are hashed." On my website, I will be storing…
user2698818
  • 151
  • 3
13
votes
3 answers

Where do you use ROT13?

I was reading through the docs for vim, and noticed there's a shortcut, for example g?w would transform the next word using ROT13. I also know that you can change the encoding of a Python file to ROT13. Here's my question: Why? It seems like it…
Brian Hicks
  • 233
  • 2
  • 7
13
votes
2 answers

How can I get my own encryption algorithm tested?

I've just developed a block cipher symmetric-key algorithm and I am using it in some of my products. I want to put it to real test. How would one go about entering their encryption algorithm into an international encrytption contest?
Kaveh Shahbazian
  • 332
  • 1
  • 13
12
votes
2 answers

Saving critical data in (third party) databases

How do you save important(privacy-wise) user data like SSN, Credit Card Numbers and Addresses in databases? Scenario: Only data which needs to be available is saved. For eg, SSN is saved because the app uses the SSN to identify a particular record.…
abel
  • 697
  • 10
  • 15
11
votes
3 answers

How does a web browser save passwords?

How do current web browsers (or mobile mail clients and any software in general) save user passwords? All answers about storing passwords say we should store only hashes, not the password themselves. But I'm having a hard time searching the web…
marcus
  • 254
  • 1
  • 2
  • 12
8
votes
2 answers

Data encryption/protection - where to find info about high-level best practices

I feel that no one in the group I work in, myself included, really groks encryption and security, or the reasons behind making certain decisions. For example, we recently had a conversation regarding encryption of data that we handle for another…
nlawalker
  • 3,002
  • 20
  • 21
8
votes
3 answers

Encryption Cannot Be Reversed?

I am under the impression that an encrypted string cannot be decrypted so the original value is lost forever. However, if the following string always equals "dominic" (my name), then can't there be some logical way to reverse it; being as it's not…
user1477388
  • 279
  • 1
  • 10
8
votes
3 answers

How do I encrypt the source code on the webserver?

I have a web application developed using Python, HTML, CSS & JavaScript. The customer installs it in any of their own Machine and uses it through their LAN. In short the customer sets up the webserver in any of their own machine. Since its a web…
ASKN
  • 915
  • 2
  • 8
  • 14
1
2 3
9 10