Category "cryptography"

subtle crypto with ECDSA : Cannot create a key using the specified key usages

I wanted to import an ECDSA private key in Chrome to sign some data, tried yet with crypto.subtle.importKey: feeded the importKey with a derivated private key u

Coinbase API BTC account missing

thanks for coming to my aid. In the course of using the coinbase API, when I callclient.getAccounts({}, function(error, accounts){console.log('accounts', accoun

How to configure openjdk for FIPS and simple postgres connection example

I have a simple Java application running in an openjdk Docker container that is executing on a FIPS enabled host system (on a Kubernetes clust

i want implement ICO Contract for token contract

I have some simple ico contracts for airdrop and presale with lock token future to lock token until ico end and I want to know how to connect it to token contra

Error using sign.sign() in Node.js crypto, bad decrypt

New to node.js and I got error using sign() in crypto.Please help! I created sign using const sign = crypto.createSign('sha256'); and then tried to sign with

Andoid 12 Keystore user_0 missing foder

I'm currently doing a study on application forensics on Android 12 API 31. in this study I need to use a private key from Keystore that I can find no problem in

How to generate a cryptographically secure random integer within a range?

I have to generate a uniform, secure random integer within a given range for a program that generates passwords. Right now I use this : RNGCryptoServiceProvide

from field must match key's x, but it was y

I write the code below. It seems it has a problem with the "signed_txn = w3.eth.account.sign_transaction(transaction, private_key=private_key" part. I face to t

pyconfig.h missing during "pip install cryptography"

I wanna set up scrapy cluster follow this link scrapy-cluster,Everything is ok before I run this command: pip install -r requirements.txt The requirements.tx

How to apply Shamir's Secret Sharing on strings passwords

I was trying to write a simple code to generate and obtain passwords using Shamir's secret sharing method. My question is: How can I apply this to string passwo

How to transfer custom SPL token by '@solana/web3.js' and '@solana/sol-wallet-adapter'

Hello I am trying to transfer a custom SPL token with the solana-wallet adapter. However i am having trouble getting the wallet's secret key/signing the transac

Does the size of the prime number in Shamir's Secret Sharing affect the security of the sharding?

I've been working on an implementation of Shamir's Secret Sharing, and was wondering if the prime number selected will impact on the security. This is mainly be

Is there a way to seed a cryptographically secure RNG engine in rust using a [u8; 64] array?

ORIGINAL QUESTION: I am currently trying to write a library in rust - to be compiled to WASM - for converting a bip39 mnemonic passphrase into an Arweave JWK. I

Get IV size for a specific cipher in node.js

Is there a way to get the IV size for a specific cipher, like what is returned by a call to OpenSSL's EVP_CIPHER_CTX_iv_length()? If an IV has the wrong size,

ECDH with HKDF using c#

What is the best way to implement a elliptic curve diffie hellman using HKDF as key derivation function in windows using native windows functionallity. I couldn

Python cryptography -- How to include X509 extensions for "Subject Key Identifier" and "Authority Key Identifier" in a self-signed cert?

I am using the "cryptography" module in Python to create self-signed certificates for testing. I followed the examples here "https://cryptography.io/en/latest/x

Flutter - How to decrypt a RSA private key encrypted string if we have RSA public key with us?

Flutter app receives public key in the form of contents of public.pem file which would be a string like "-----BEGIN PUBLIC KEY----- MIICqq7DBi9sBXZfDYJC+G57JYUC

Getting Started with crypto++ decryption with AES

I'm trying to learn a bit about cryptography and am trying to use AES decryption with the crypto++ library in c++. I have a ciphertext string and a key string.

One-to-one integer mapping function

We are using MySQL and developing an application where we'd like the ID sequence not to be publicly visible... the IDs are hardly top secret and there is no sig

What Salt size and position for AES 256?

I haven't written encryption in a while and have forgotten some stuff. I remember that to have the output be different for the same data using the same key, I w