Gang Of Coders
Home
About Us
Contact Us
All Cryptography Solutions on Gang of Coders
Total of 106 Cryptography Solutions
How do you use bcrypt for hashing passwords in PHP?
Php
Passwords
Cryptography
Password Protection
Bcrypt
Encrypt and decrypt a string in C#?
C#
.Net
Encryption
Mono
Cryptography
Fundamental difference between Hashing and Encryption algorithms
Security
Encryption
Hash
Cryptography
Java 256-bit AES Password-Based Encryption
Java
Encryption
Cryptography
Passwords
Aes
How are software license keys generated?
Security
Cryptography
License Key
Is "double hashing" a password less secure than just hashing it once?
Security
Hash
Passwords
Cryptography
Password Hash
Failed to install Python Cryptography package with PIP and setup.py
Python
Cryptography
Pip
What data type to use for hashed password field and what length?
Mysql
Hash
Types
Passwords
Cryptography
Where do you store your salt strings?
Security
Authentication
Hash
Cryptography
Salt
Is it possible to decrypt MD5 hashes?
Hash
Cryptography
Md5
Encryption
Simplest two-way encryption using PHP
Php
Security
Encryption
Cryptography
Encryption Symmetric
How to hash some string with sha256 in Java?
Java
Cryptography
Sha256
Cryptographic Hash-Function
How do you Encrypt and Decrypt a PHP String?
Php
Security
Encryption
Cryptography
Encryption Symmetric
How does password salt help against a rainbow table attack?
Hash
Cryptography
Salt
Rainbowtable
Difference between java.util.Random and java.security.SecureRandom
Java
Random
Cryptography
Security
Why are primes important in cryptography?
Cryptography
Primes
Why is XOR the default way to combine hashes?
Cryptography
Bit Manipulation
Hash
Probability
Xor
Salting Your Password: Best Practices?
Hash
Cryptography
Passwords
Salt
Padding is invalid and cannot be removed?
C#
Cryptography
Is SHA-1 secure for password storage?
Cryptography
Hash
Sha1
Why does SSL handshake give 'Could not generate DH keypair' exception?
Java
Ssl
Cryptography
Diffie Hellman
Which cryptographic hash function should I choose?
C#
.Net
Hash
Cryptography
Cryptographic Hash-Function
Encrypt Password in Configuration Files?
Java
Security
Encryption
Configuration
Cryptography
How does this giant regex work?
Php
Regex
Security
Cryptography
Given final block not properly padded
Java
Exception
Encryption
Cryptography
javax.crypto
Is calculating an MD5 hash less CPU intensive than SHA family functions?
Hash
Cryptography
Md5
Sha1
Sha2
MD5 algorithm in Objective-C
Objective C
Iphone
Cryptography
Md5
Cryptographic Hash-Function
What are the differences between .pem, .cer and .der?
Encryption
Cryptography
Rsa
MD5 is 128 bits but why is it 32 characters?
Hash
Cryptography
Md5
Cryptographic Hash-Function
Using AES encryption in C#
C#
Cryptography
Aes
Rijndaelmanaged
How to encrypt/decrypt data in php?
Php
Security
Encryption
Cryptography
Encryption Symmetric
Image encryption/decryption using AES256 symmetric block ciphers
Java
Android
Encryption
Cryptography
Aes
What RSA key length should I use for my SSL certificates?
Ssl
Cryptography
Rsa
Ssl Certificate
Csr
Can two different strings generate the same MD5 hash code?
Hash
Cryptography
Md5
Hash Collision
How come MD5 hash values are not reversible?
Hash
Cryptography
Md5
Cryptographic Hash-Function
Why doesn't Git use more modern SHA?
Git
Cryptography
Sha
MD5 hashing in Android
Android
Cryptography
Md5
Non-random salt for password hashes
Security
Authentication
Hash
Cryptography
Password Protection
C# RSA encryption/decryption with transmission
C#
Cryptography
Rsa
Why use the C# class System.Random at all instead of System.Security.Cryptography.RandomNumberGenerator?
C#
.Net
Cryptography
Random
Why do people use bouncycastle instead of Java's built in JCE provider? What is the difference?
Java
Cryptography
How to read a PEM RSA private key from .NET
C#
.Net
Cryptography
Rsa
Secure random numbers in javascript?
Javascript
Cryptography
Converting a md5 hash byte array to a string
C#
Hash
Cryptography
Md5
Cryptographic Hash-Function
Why is XOR used in cryptography?
Encryption
Cryptography
How to encrypt data that needs to be decrypted in node.js?
Javascript
node.js
Encryption
Cryptography
Node Crypto
How to get a MD5 hash from a string in Golang?
Cryptography
Md5
Go
How can I create a random number that is cryptographically secure in python?
Python
Random
Cryptography
How do I get the public key of a pem file?
Ssh
Cryptography
Bitbucket
Private Key
Pem
Is it possible to get identical SHA1 hash?
Cryptography
Hash
Sha1
Checksum
Why do I need to use the Rfc2898DeriveBytes class (in .NET) instead of directly using the password as a key or IV?
C#
Cryptography
Rfc2898
Why java.security.NoSuchProviderException No such provider: BC?
Java
Security
Cryptography
Jce
How to create and use nonces
Php
Actionscript 3
Cryptography
Nonce
How to decrypt a SHA-256 encrypted string?
Java
Hash
Cryptography
Generate SHA hash in C++ using OpenSSL library
C++
Cryptography
Login without HTTPS, how to secure?
Php
Ajax
Security
Encryption
Cryptography
NodeJS: bcrypt vs native crypto
node.js
Cryptography
Bcrypt
What is the Difference between a Hash and MAC (Message Authentication code)?
Hash
Cryptography
Terminology
Did I understand /dev/urandom?
Linux
Unix
Random
Cryptography
How does a cryptographically secure random number generator work?
Encryption
Random
Cryptography
What are optimal scrypt work factors?
Java
Cryptography
Scrypt
Microsoft Crypto API Disable Use of RSAES-OAEP Key Transport Algorithm
C
Windows
Encryption
Cryptography
Mscapi
How to install cryptography on ubuntu?
Python
Ubuntu
Cryptography
Pip
Using SHA1 and RSA with java.security.Signature vs. MessageDigest and Cipher
Java
Encryption
Cryptography
Rsa
Digital Signature
Storing passwords with Node.js and MongoDB
Javascript
Mongodb
node.js
Cryptography
Aes
How to Generate Unique Public and Private Key via RSA
C#
Encryption
Cryptography
Rsa
Key
What is the most secure seed for random number generation?
Security
Cryptography
Random
What is the difference between hash salting and noncing?
Security
Hash
Cryptography
Example of AES using Crypto++
Encryption
Cryptography
Aes
Crypto++
Save and load crypto/rsa PrivateKey to and from the disk
Go
Cryptography
Rsa
How do I enable perfect forward secrecy by default on Apache?
Apache
Ssl
Cryptography
How to create md5 hash in bash in Mac OS X
Macos
Bash
Cryptography
How can I generate a cryptographically secure pseudorandom number in C#?
C#
Cryptography
PHP AES encrypt / decrypt
Php
Encryption
Cryptography
Aes
Encryption Symmetric
Calculating HMACSHA256 using c# to match payment provider example
C#
Security
Cryptography
Given a private key, is it possible to derive its public key?
.Net
Encryption
Cryptography
Encryption Asymmetric
How does Git(Hub) handle possible collisions from short SHAs?
Git
Cryptography
Github
Sha
CryptographicException "Key not valid for use in specified state." while trying to export RSAParameters of a X509 private key
C#
.Net
Encryption
Cryptography
Rsa
How securely unguessable are GUIDs?
.Net
Cryptography
Guid
What does tilde(~) operator do?
C
Cryptography
How to cryptographically hash a JSON object?
Json
Cryptography
Canonicalization
What exactly is a rainbow attack?
Cryptography
Saltedhash
Rainbowattack
SHA1 VS RSA: what's the difference between them?
Encryption
Cryptography
Rsa
Sha
What's the shortest pair of strings that causes an MD5 collision?
Math
Cryptography
Md5
Hash Collision
How can I hash passwords in postgresql?
Security
Postgresql
Hash
Cryptography
Salt
Is Math.random() cryptographically secure?
Javascript
Random
Cryptography
How to store/retrieve RSA public/private key
C#
.Net
Cryptography
Rsa
How to recover a RSA public key from a byte[] array?
Java
Cryptography
Rsa
How long to brute force a salted SHA-512 hash? (salt provided)
Hash
Cryptography
Salt
Brute Force
Sha
safe enough 8-character short unique random string
Python
Hash
Random
Cryptography
Registering multiple keystores in JVM
Java
Ssl
Cryptography
Jvm
Jsse
.NET implementation of scrypt
C#
.Net
Cryptography
Hash
Scrypt
Where is the PEM file format specified?
Security
Openssl
Cryptography
Certificate
How are the IV and authentication tag handled for "AES/GCM/NoPadding"?
Java
Security
Encryption
Cryptography
Aes Gcm
verifying a file signature with openssl dgst
Cryptography
Openssl
Signing
How to hash a string in Android?
Java
Android
Hash
Cryptography
Why does RSA encrypted text give me different results for the same text
Unix
Terminal
Cryptography
Openssl
Rsa
ERROR: Could not build wheels for cryptography which use PEP 517 and cannot be installed directly
Python
Pip
Cryptography
Python Cryptography
Digital signature for a file using openssl
Cryptography
Openssl
Rsa
What does a circled plus mean?
Math
Cryptography
Matrix
java equivalent to php's hmac-SHA1
Java
Php
Cryptography
Hmac
Blackberry smartcard reader example
Blackberry
Cryptography
Rsa
Smartcard
Smartcard Reader
Node.js hashing of passwords
node.js
Security
Cryptography
Passwords
Password Hash
C# Export Private/Public RSA key from RSACryptoServiceProvider to PEM string
C#
Cryptography
Rsa
Pem
PKCS#1 and PKCS#8 format for RSA private key
Cryptography
Rsa
Pki
Pkcs#1
Pkcs#8
How many prime numbers are there (available for RSA encryption)?
Cryptography
Rsa
Primes
Prime Factoring