Tag: encryption

621 Encrypt and decrypt a string in C#? 2008-10-14T17:07:32.963

465 Fundamental difference between Hashing and Encryption algorithms 2011-02-09T17:30:05.773

463 Are HTTPS headers encrypted? 2008-10-09T15:00:35.650

388 How to choose an AES encryption mode (CBC ECB CTR OCB CFB)? 2009-08-03T05:12:40.787

355 Java 256-bit AES Password-Based Encryption 2009-06-14T02:39:02.193

296 Does my application "contain encryption"? 2010-01-25T19:43:43.860

287 What is the most appropriate way to store user settings in Android application 2009-04-24T14:03:08.337

277 Encrypting & Decrypting a String in C# 2012-04-16T03:02:20.427

223 Is it possible to decrypt MD5 hashes? 2009-08-06T19:25:24.013

212 Best way to use PHP to encrypt and decrypt passwords? 2009-08-17T16:39:02.723

210 SHA512 vs. Blowfish and Bcrypt 2009-10-13T15:56:19.190

193 What is the difference between encrypting and signing in asymmetric encryption? 2009-01-17T21:07:43.467

191 Simplest two-way encryption using PHP 2012-02-13T14:23:18.920

183 How do you Encrypt and Decrypt a PHP String? 2013-05-17T02:57:13.737

178 Do I need to store the salt with bcrypt? 2008-11-10T04:14:55.340

176 When would I need a SecureString in .NET? 2008-09-26T18:43:31.073

166 Two-way encryption: I need to store passwords that can be retrieved 2011-02-23T10:48:00.473

150 How do you test a public/private DSA keypair? 2008-11-08T09:36:32.477

150 How to hash some string with sha256 in Java? 2011-04-03T18:09:34.117

143 How to use OpenSSL to encrypt/decrypt files? 2013-04-17T09:15:05.503

138 Should I impose a maximum length on passwords? 2008-09-19T01:49:29.360

133 MD5 algorithm in Objective C 2009-10-06T09:45:07.040

131 Encrypt & Decrypt using PyCrypto AES 256 2012-09-21T05:54:41.483

128 How to convert SecureString to System.String? 2009-05-04T03:36:24.980

122 AES Encryption for an NSString on the iPhone 2009-09-09T14:55:41.953

120 What is the optimal length for user password salt? 2008-10-08T18:20:25.297

119 How to encrypt String in Java 2009-07-30T08:13:10.147

115 Converting a Java Keystore into PEM Format 2009-03-17T03:14:29.380

113 Encrypt Password in Configuration Files? 2009-07-15T16:47:21.170

112 What is the purpose of base 64 encoding and why it used in HTTP Basic Authentication? 2010-11-01T16:09:21.037

111 Difference between Hashing a Password and Encrypting it 2008-11-28T21:14:57.050

110 What is the difference between DSA and RSA? 2010-05-15T17:41:26.607

109 RSA Public Key format 2012-10-05T15:55:50.287

107 SVN encrypted password store 2010-09-29T18:04:38.203

105 SQLite with encryption/password protection 2011-04-14T21:25:37.820

104 AES vs Blowfish for file encryption 2010-11-10T17:53:53.177

102 Difference between encoding and encryption 2011-01-11T12:05:55.387

100 How to send password securely over HTTP? 2009-10-17T18:32:49.393

100 How to encrypt/decrypt data in php? 2012-06-06T14:28:52.973

98 Javascript AES encryption 2009-04-27T14:40:00.623

95 The necessity of hiding the salt for a hash 2008-10-17T18:49:38.747

95 How to encrypt bytes using the TPM (Trusted Platform Module) 2015-03-04T19:06:27.337

94 Protecting Java Source Code From Being Accessed 2013-04-17T14:13:18.380

93 Best practices around generating OAuth tokens? 2009-10-26T18:41:26.983

93 How does BitLocker affect performance? 2010-05-04T04:38:20.763

93 Simple Java AES encrypt/decrypt example 2013-03-21T17:31:51.307

92 Encryption with multiple different keys? 2009-02-28T00:28:23.963

92 JavaScript string encryption and decryption? 2013-08-16T17:40:22.233

91 Purpose of Django setting ‘SECRET_KEY’ 2011-09-11T23:59:01.740

87 android encryption/decryption with AES 2011-07-22T09:24:03.923

86 Given final block not properly padded 2011-11-08T11:45:38.687

85 How come MD5 hash values are not reversible? 2008-12-01T07:16:58.987

83 What are best practices for using AES encryption in Android? 2011-12-24T02:50:35.627

81 What's the difference between id_rsa.pub and id_dsa.pub? 2010-05-12T18:38:09.617

79 How to decrypt an encrypted Apple iTunes iPhone backup? 2009-09-30T14:07:16.613

77 Simple way to encode a string according to a password? 2010-03-22T06:23:04.410

76 Preferred Method of Storing Passwords In Database 2009-03-05T17:10:36.120

76 Obfuscating an ID 2011-12-18T19:43:37.230

74 Converting Secret Key into a String and Vice Versa 2011-03-18T17:09:37.820

73 Android database encryption 2010-02-04T23:23:36.073

72 Login without HTTPS, how to secure? 2010-02-25T18:43:17.767

70 Salt Generation and open source software 2009-10-29T17:00:59.493

70 Microsoft Crypto API Disable Use of RSAES-OAEP Key Transport Algorithm 2012-10-26T15:48:17.900

69 Recommendations on a free library to be used for zipping files 2008-10-03T11:00:26.133

69 Using SSL in an iPhone App - Export Compliance 2010-01-24T21:25:56.907

69 How to Export Private / Secret ASC Key to Decrypt GPG Files in Windows 2011-04-07T20:53:24.023

68 MD5 is 128 bits but why is it 32 characters? 2011-06-11T17:00:32.323

67 gnupg: There is no assurance this key belongs to the named user 2015-10-27T06:16:22.163

66 Converting a md5 hash byte array to a string 2010-03-12T20:35:43.557

66 Password encryption at client side 2010-11-08T06:04:54.557

65 What's the difference between SHA and AES encryption? 2009-06-13T13:47:43.870

65 Does has_secure_password use any form of salting? 2012-04-13T11:27:39.530

64 Best Practices for Passing Data Between Pages 2010-07-08T20:17:14.010

63 Best solution to protect PHP code without encryption 2008-12-03T02:11:30.613

63 Using SHA1 and RSA with java.security.Signature vs. MessageDigest and Cipher 2009-02-06T16:51:55.727

63 How does a cryptographically secure random number generator work? 2010-03-15T18:44:32.760

63 Method not found using DigestUtils in Android 2012-02-03T09:43:11.427

62 How do I use 3DES encryption/decryption in Java? 2008-08-21T15:25:22.540

62 Hash function that produces short hashes? 2010-12-30T23:32:30.160

61 Encrypting/Hashing plain text passwords in database 2008-11-13T17:00:41.730

61 mcrypt is deprecated, what is the alternative? 2016-12-21T21:34:12.417

60 Why is security through obscurity a bad idea? 2009-02-10T20:10:07.543

60 How to Generate Unique Public and Private Key via RSA 2009-08-20T16:03:33.060

60 Why is XOR used on Cryptography? 2009-09-04T15:29:23.367

59 Storing encryption keys -- best practices? 2009-04-06T23:38:45.197

58 Best way to store encryption keys in .NET C# 2011-02-11T09:17:45.393

58 PEM_read_bio_PrivateKey() returns NULL in ECB mode only 2013-07-03T15:14:10.263

57 How does the RSA private key passphrase work under the hood? 2009-11-21T04:02:00.350

57 I need to securely store a username and password in Python, what are my options? 2011-08-10T17:13:04.213

56 Somebody is storing credit card data - how are they doing it? 2010-03-16T23:53:48.570

56 AES Encryption - Key versus IV 2012-01-29T00:14:42.360

55 How to encrypt and decrypt file in Android? 2010-11-25T09:09:07.033

54 Securly Storing OpenID identifiers and OAuth tokens 2009-12-10T05:38:10.653

54 IsolateApps causes Decryption key specified has invalid hex characters 2013-02-21T13:03:35.900

53 What is currently the most secure one-way encryption algorithm? 2010-02-24T21:14:42.803

53 Size of data after AES/CBC and AES/ECB encryption 2010-07-19T18:14:49.170

52 What is the easiest way to encrypt a password when I save it to the registry? 2008-10-17T14:55:48.093

52 When compressing and encrypting, should I compress first, or encrypt first? 2011-01-13T02:01:29.767

51 Is Cipher thread-safe? 2011-08-05T13:52:29.860