Questions tagged [encryption]

Process of encoding information such that decoding requires the knowledge of some secret (a key). This tag covers questions about obfuscated and encrypted programs, or tools, but higher level questions may get better answers on Cryptography Stack Exchange.

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).

Encryption may commonly be confused with , since both revolve around concealing the original code.

Encryption has long been used by militaries and governments to facilitate secret communication. Encryption is now commonly used in protecting information within many kinds of civilian systems. It can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers' personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection) are another somewhat different example of using encryption on data at rest.

Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks.

Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication code (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. See, e.g., traffic analysis, TEMPEST, or Trojan horse.

One of the earliest public key encryption applications was called Pretty Good Privacy (PGP). It was written in 1991 by Phil Zimmermann and was purchased by Network Associates (now PGP Corporation) in 1997.

A tip: conceptual questions about encryption might get more attention and better answers from our sister site Cryptography Stack Exchange.

Source: Wikipedia.

210 questions
6
votes
1 answer

Decrypt the cookies stored by the MS Teams desktop client

I am creating a digital forensic tool that gets all data of user from different platforms. I successfully have done extraction for Teams website but I am unable to do so for the desktop app. So far, I know that the cookies are stored in…
farhan jatt
  • 111
  • 4
5
votes
1 answer

What can I do with a SSH certificate?

Doing an information security project at the moment. After gaining access to ftp drive, there was a file simply called 'hackme' inside. It contains what looks like to me a SSH certificate, but not sure what I can do with it or how to reverse/break…
tert
4
votes
1 answer

Reversing encryption by analysing executable

I have a program that reads data from a file, parses/organizes it, and spits it out as an encrypted XML. The application can also take an encrypted XML and spit out the original file. My objective at this point would be to access the clear-text XML…
Juicy
  • 275
  • 5
  • 9
4
votes
2 answers

What key is being using to encrypt the key transport in this Zigbee capture?

I am working with a Zigbee system and I have been trying to grab the network key as it is exchanged during pairing. I wasn't having much luck with the combination of TI Packet Sniffer, Wireshark and Killerbee - it kept on failing. This combination…
Cybergibbons
  • 1,762
  • 2
  • 17
  • 26
4
votes
1 answer

RE Huawei HG8145V5 user credentials

I have Huawei HG8145V5 and I backed up config file which contains encrypted root and admin credentials, but I dont know how they are encrypted. Here is an example of one password $2*FuHXY<y5$VJl(9f^9z%7;vR%K;84JG$.&O`qM17$ Can anyone…
Vido
  • 515
  • 8
  • 22
3
votes
1 answer

Identifying an algorithm used to sign iCloud payload

I'm trying to decipher which algorithm was used to sign a specific chunk of data while reverse-engineering iCloud backups. Long story short: I'm trying to retrieve some old voicemails that I lost when switching mobile providers which were deleting…
3
votes
0 answers

Reverse-engineering 24-bit to make the lock system recognize NFC cards as their own

I own a lock system that uses SRI512 cards. My supplier (manufacturer of the locks) sells the cards at a very expensive price, so I decided to buy them online. Once they arrived, when I tried to write them, through the proprietary reader, the writer…
Andrea P.
  • 31
  • 2
2
votes
3 answers

Facing encryption

I have an encrypted hex string: AA969CF9657F77C597C8EAFF1594D59374E4977F which I know corresponds to the plaintext: http://jogos.meo.pt/ I want to know if it is possible to find out what encryption algorithm might have been used? Anybody could…
user36384
  • 57
  • 4
2
votes
0 answers

Looking for some help for decoding a signal from IR remote

The following signal has been captured from a remote that I suspect code for at least 3 things: the ID: 107, the item: 1, and the color. I didn't change the ID and item here (although I could do so and send the results), I only changed the color for…
Vincent
  • 21
  • 1
2
votes
0 answers

Find out used encryption in an SQLite database

Is it possible to see from a string which encryption an SQLite database uses? Let's say, I can open the database and see this: O45dTrA6NKG6SYeCENMwV7nxp66HR9lbhK12NGHgVnzEhebMjMJUhTmConk= - how do I know which encryption is used? And how to decrypt…
c1ph4
  • 21
  • 2
2
votes
1 answer

reverse checksum algorithm

I'm working on this pseudocode trying to find the correct input for the expected calculated value (i'm not sure if i can call it a checksum). I can't focus enough to generate the reverse algorithm, then any kind of help is appreciated. I may start…
1
vote
0 answers

How to identify digital signature and sign executables with it?

There is an embedded platform which requires signing binary executable file for them to be loadable onto CPU from flash. Signed executable consists from signature (first 40 bytes) and unsigned executable concatenated together. Unsigned executable…
AAA BBB
  • 11
  • 2
1
vote
2 answers

Emulation Project - GameGuard Protected Client

I'm not new to MMO Server Emulation, but I am new to working with a protected Client, and have very basic RCE skills. I would appreciate some direction, and maybe this won't be possible, given the requirements. The target is Uncharted Waters Online,…
Lokked
  • 45
  • 6
1
vote
1 answer

Find encryption algorithm used by a program?

I have a 64 bit program that runs under windows. It has the ability to encrypt a specified file with what I believe is a 256 bit AES key. The user specifies the input file location and the desired output file. I'd like to figure out what the key…
joe
  • 21
  • 1
1
vote
0 answers

Help on 7zip PW cracker / Reverse engineering question

So a couple weekends ago I attended a cyber Security workshop where I met a prospective employer who gave me a business card. On one side it read "There are two individual challenges that lead to a third) and the other was this.…
Donghead
  • 11
  • 1
1
2