Top "Cryptography" questions

CRYPTOGRAPHY MUST BE PROGRAMMING RELATED.

How to install cryptography on ubuntu?

My ubuntu is 14.04 LTS. When I install cryptography, the error is: Installing egg-scripts. uses namespace packages but the distribution does …

python ubuntu cryptography pip
Node.js hashing of passwords

I am currently using the following for hashing passwords: var pass_shasum = crypto.createHash('sha256').update(req.body.password).…

node.js security cryptography passwords password-hash
Is SHA-1 secure for password storage?

Conclusion: SHA-1 is as safe as anything against preimage attacks, however it is easy to compute, which means it is …

cryptography hash sha1
how to use RSA to encrypt files (huge data) in C#

I'm new to encryption. I need to implement asymmetric encryption algorithm, which i think it uses private/public key. I …

c# cryptography rsa encryption-asymmetric 3des
How can I decode a SSL certificate using python?

How can I decode a pem-encoded (base64) certificate with Python? For example this here from github.com: -----BEGIN CERTIFICATE----- MIIHKjCCBhKgAwIBAgIQDnd2…

python ssl cryptography certificate pem
AES encryption in swift

I'm trying to implement AES encryption in swift. The encryption decryption for Android and C# is working properly. I need …

ios swift cryptography aes commoncrypto
What are the differences between .pem, .cer and .der?

What are the differences between .pem, .cer and .der? As far as I know, .cer contains public key. Are there …

encryption cryptography rsa
How to load public certificate from pem file?

I was trying to extract RES public key from the file below -----BEGIN CERTIFICATE----- MIIGwTCCBamgAwIBAgIQDlV4zznmQiVeF45Ipc0k7DANBgkqhkiG9w0…

java ssl cryptography bouncycastle public-key
Why is XOR the default way to combine hashes?

Say you have two hashes H(A) and H(B) and you want to combine them. I've read that a …

cryptography bit-manipulation hash probability xor
SHA1 VS RSA: what's the difference between them?

What are the differences between SHA1 and RSA? Are they just different algorithms or are they fundamentally (i.e. used …

encryption cryptography rsa sha