Encryption Definition and 62 Threads
-
W
BitLocker Vulnerability
https://www.forbes.com/sites/daveywinder/2025/01/26/microsoft-windows-bitlocker-vulnerability-exposes-passwords-act-now/- WWGD
- Thread
- Encryption Security
- Replies: 7
- Forum: Computing and Technology
-
S
Creating Entropy For Cryptographic Purposes
Hello, My name is Mason C. Turner and I work in the cybersecurity field. My background includes both military communications as well as private sector experience. According to the laws of physics, to the best of my understanding information and energy are directly interchangeable in a...- StarHunter
- Thread
- Cryptography Encryption Entropy Random number Randomness
- Replies: 3
- Forum: Computing and Technology
-
Encrypted radio system had unsuspected backdoor
https://www.wired.com/story/tetra-radio-encryption-backdoor/- Swamp Thing
- Thread
- Encryption Radio
- Replies: 2
- Forum: General Discussion
-
Internet Secrets estimated to survive for 15 years
According to an article in Science News, Canadian Phycisist Michele Mosca has estimated that encrypted information sent over the internet today will be crackable in about 15 years from now. So, if you send valuable information today using the normal encryption methods used today, and someone...- .Scott
- Thread
- Encryption Quantum computers
- Replies: 14
- Forum: Programming and Computer Science
-
Comp Sci Data Encryption Standard Confusion
First I'll give some context about how the book's written as many books are presenting it in different ways. Reference: CRYPTOGRAPHY AND INFORMATION SECURITY, THIRD EDITION By PACHGHARE, V. K. Confusions: 1) Why is Expansion Permutation called so? The name sounds very contrary to what...- shivajikobardan
- Thread
- Confusion Data Encryption Standard
- Replies: 2
- Forum: Engineering and Comp Sci Homework Help
-
Comp Sci Is the key of this encryption (transposition cipher) correct?
I don't have much to add in this post as it's apparent from the figure itself. DAEX UVFU RSES is column number 3 not 6. So, I think that's a mistake. I'm following this book for this sub topic only.- shivajikobardan
- Thread
- Encryption
- Replies: 3
- Forum: Engineering and Comp Sci Homework Help
-
Any suggestions for an open source Windows 10 disk encryption app
The summary says it all, really, but in addition, I've done a lot of googling and am finding it hard to identify trustworthy options. LibreCrypt, DiskCryptor and VeraCrypt are candidates, but I have not used any of these tools so am wary of jumping in and finding that I have bricked my PC.- Melbourne Guy
- Thread
- App Disk Encryption Open source Source Suggestions Windows Windows 10
- Replies: 3
- Forum: Computing and Technology
-
I A question about a small step in the proof of RSA encryption
From the paper https://people.csail.mit.edu/rivest/Rsapaper.pdf Can someone explain the green highlight to me please? Sorry that I can't type much because this is the final week. Thanks.- Leo Liu
- Thread
- Encryption Proof
- Replies: 2
- Forum: General Math
-
Python Complexity of the Steganography Encryption Method
I have implemented steganography encryption and decryption process, and I wondered if someone could decrypt the message in these conditions; (a) without having the original image (b) having the original image. The encryption starts from the first color code and the first pixel. (c) having the...- Arman777
- Thread
- Complexity Encryption Method
- Replies: 21
- Forum: Programming and Computer Science
-
F
Understand Public Key Encryption
Hello Forum, I think I understand how private key encryption works: there are two keys, one for Alice sender ##K_{s}## and one for Bob the receiver ##K_{r}## . The two keys are identical, correct? By analogy, I envision a mechanical lock that can be opened/closed with the same key. Alice...- fog37
- Thread
- Encryption
- Replies: 8
- Forum: Computing and Technology
-
Comp Sci Asymmetric Encryption: Overview & Techniques
Outlined above- Krushnaraj Pandya
- Thread
- Encryption
- Replies: 3
- Forum: Engineering and Comp Sci Homework Help
-
G
Question about the vulnerability of encryption
I know, once a good encryption is properly established, the whole computing capacity of Earth couldn't crack it in reasonable time. But could the hackers intercept the keys? For example, a surveillance camera communicating with a server through an optical cable, and the cable has an included...- GTOM
- Thread
- Encryption
- Replies: 9
- Forum: Programming and Computer Science
-
Python Python 3.0 , encoding="utf-8" for encryption
I had recently upgraded my version of python from 2 to 3. I had a program that encrypted a text file by converting a character to its Unicode value, altering it and then changing it back to a character using the ord() and chr() methods. This does not seem to work with python 3 and I was...- NihalRi
- Thread
- Encryption Python
- Replies: 3
- Forum: Programming and Computer Science
-
Python Deciphering ASCII Codes with a 3 Letter Encryption Key
I come across a problem where I should decipher a text of ASCII codes using a encryption key consists of three lower case characters. And I know that the plain text should contain english words. I searched online sources but I still didnt understand how should I approach the problem. Any help...- Arman777
- Thread
- Encryption
- Replies: 13
- Forum: Programming and Computer Science
-
Why doesn't public key encryption stop hackers?
This is a question from a total non-specialist: I can't write or even read code; I just follow the mathematical underpinnings. The public key encryption schemes seem almost unbreakable, theoretically (until quantum computers come along), so what is it that allows hackers to hack one's email, for...- nomadreid
- Thread
- Encryption hackers Hacking
- Replies: 3
- Forum: Programming and Computer Science
-
T
Can this be decrypted using a simple ASCII conversion?
Hi, I am trying to decrypt something in a .txt file as a challenge from a friend, the file contains: pÿd“ÙÃÊÌßéh'rv‹"^÷ù O˜w؉D•ÍúúYíY’ ∞¶iÀªÆzI¥r=«Å∑F¸¡„;≥ûü¸ã7∂.ˆ– ã<¿µD~’ÅsG›îwA_4Gå#›¥’6ª˝_ÎaÍÑjù]ÚU3Y{äF-Ê#i 33(›öR `?™|¸ ®flîè+zÂ√œ/fiãìR˛˙˚∂ZëìÆºΩÒ†»˘∂®∑‘¬z vóR◊r∂Øûp)E...- Tech2025
- Thread
- Encryption Random
- Replies: 5
- Forum: Programming and Computer Science
-
How Can Ternary Sloot Encryption Enhance Data Security?
I think I figured out Sloot encryption, and am thinking of designing a ternary, volumetric version. Any thoughts?- RyderP
- Thread
- Encryption
- Replies: 5
- Forum: Science Fiction and Fantasy Media
-
G
How fast can hackers crack 128 bit file encryption?
I got a freeware encryption software with only 128 bit. How fast it is for hackers to crack 128 bit file encryption?- gva
- Thread
- Bit Crack Encryption File hackers
- Replies: 17
- Forum: Computing and Technology
-
F
Difference Between Electrical and Optical Signal Encryption?
What is the difference between encrypting an electrical signal and converting it to optics; & converting the signal to optics and then encrypting it? (Any of the symmetric or asymmetric encryption techniques).- Fiona Rozario
- Thread
- Encryption Optical Signal
- Replies: 4
- Forum: General Engineering
-
F
Trouble understanding modulo equivalence notation
Homework Statement I'm trying to understand RSA and modular math better. I've studied some of the relations and rules, but I keep getting stuck when i try to follow an example all the way through. I'm also getting confused by how I'm supposed to treat ≡ vs = at some times. Here is the...- FrankJ777
- Thread
- Encryption Equivalence Notation
- Replies: 1
- Forum: Engineering and Comp Sci Homework Help
-
Insights Perfect Secrecy and the Unbreakable Cipher - Comments
bapowell submitted a new PF Insights post Perfect Secrecy and the Unbreakable Cipher Continue reading the Original PF Insights Post.- bapowell
- Thread
- cryptology encryption
- Replies: 6
- Forum: General Math
-
G
RSA encryption in the real world?
Homework Statement It is about an exercise called "RSA encryption". The problem statement was : Let p,q be distinct prime numbers so that ##n = pq##. If c,d are two integers so that the Euler totient function of n, ##\phi(n)##, divides ##cd - 1##, show that for any ##t\in\mathbb{Z}##, ##n##...- geoffrey159
- Thread
- Encryption Real world
- Replies: 2
- Forum: Calculus and Beyond Homework Help
-
Backdoors into encryption technology, "That's just stupid."
Today's hearing with the FBI.- nsaspook
- Thread
- Encryption Stupid Technology
- Replies: 3
- Forum: Computing and Technology
-
M
MHB How Can You Multiply Ciphertexts in ElGamal Without Decrypting?
Hey! :o At an ElGamal encryprion system at the group $\mathbb{Z}_{786}^{\star}$ with base $g=\overline{2}$ ( it is a generator ) the public key of Alice is $y=\overline{5}$. We see to encryptions $(r_1, c_1)=(318, 191)$ of the unknown message $m_1$ and $(r_2, c_2)=(79, 118)$ of the unkown...- mathmari
- Thread
- Encryption System
- Replies: 1
- Forum: General Math
-
Y
MHB Understanding RSA Encryption: What Stops Attackers from Calculating d?
Hello guys, I need your help in understanding something about the RSA encryption. You start with two primes, p and q, from which you get n and phi(n) then you choose a number e such that it is larger than 1 but smaller than phi(n) and co-prime of phi(n) then you use Euclid's algorithm to...- Yankel
- Thread
- Encryption
- Replies: 8
- Forum: General Math
-
MHB Book/Article Recommendations - Fully Homomorphic Encryption
Hi everyone, :) I am trying to understand how Gentry's Fully Homomorphic encryption scheme. However I think I lack background knowledge to understand it perfectly. Does anybody have any recommendations to what a good starting point might be to understand this crypto system?- Sudharaka
- Thread
- Encryption
- Replies: 1
- Forum: Science and Math Textbooks
-
M
MHB Invertible matrices and encryption
First off, I apologize if I'm in the wrong thread. I wasn't really sure where to put this. Alright, long winded question so stay with me (note: the actual question is at the end, so if you already know how to work it out, just skip ahead)! I was reading a math problem at the nsa.gov website (...- Minecrazy
- Thread
- Encryption Matrices
- Replies: 2
- Forum: Linear and Abstract Algebra
-
How long to crack this encryption by brute-force ?
How long to crack this encryption method by brute-force ? I have a 64 character password created using a simple substitution cypher of the base 64 character set, i.e. all characters are included in the password , none are repeated. How long would it take a modern computer to crack this...- B0b-A
- Thread
- Crack Encryption
- Replies: 27
- Forum: Computing and Technology
-
Do you use encryption? According to NSA = Potential Terrorist
And on top of that; if you speak a language that is out of place for the region you are in – You are probably a terrorist! And on top of that; if you search the web for “suspicious stuff” (like Osama bin Laden) – You are MOST LIKELY a TERRORIST! Can’t believe this is true ... sigh ... Lloyd...- DevilsAvocado
- Thread
- Encryption Potential
- Replies: 16
- Forum: General Discussion
-
F
Bitcoin Encryption and Quantum Computers (D-Wave)
Hi, Not sure if this is the right place to post this but... I understand that D-Wave has a developed an adiabetic quantum computer. Google and Lockheed Martin have both purchased these computers from D-Wave recently. Could such a quantum computer (or perhaps future versions of it with...- FallingMan
- Thread
- Bitcoin Computers Encryption Quantum Quantum computers Quantum computing
- Replies: 2
- Forum: Quantum Physics
-
Java Is JavaScript encryption still secure ?
JavaScrypt is an encryption program [ 256AES ?] released in 2005 ... http://www.fourmilab.ch/javascrypt/javascrypt.html Is this still a secure method of encryption ? , an example of an encrypted messages is below, [ the key is a 64 character hexadecimal number ] ##### Encrypted...- B0b-A
- Thread
- Encryption Javascript
- Replies: 4
- Forum: Programming and Computer Science
-
J
Help me make a very mathematical encryption algorithm
Suppose I make an application with a password of max 20 characters -- no special characters and not case-sensitive. So that means there is a 1-to-1 correspondence between the set of all passwords P and the set S = {1, 2, ..., 3720 - 1, 3720}. A simple bijective function f:P-->S could be...- Jamin2112
- Thread
- Algorithm Encryption Mathematical
- Replies: 8
- Forum: Computing and Technology
-
E
Encryption and/ as file compression
Im not exactly sure how encryption works, but, I think, it basically just scrables the alphabet, if you will. So somthing like "dusk" would become "ftjo" if red withot the decryption key. (of course, it is more complicated and in binary, but still..) Right? So.. if so, and if encryption keyy...- Edi
- Thread
- Compression Encryption File
- Replies: 9
- Forum: Programming and Computer Science
-
U
Quantum computing calls for new encryption techniques?
With the phenomenal speed to be expected from quantum computers in the future, todays encryption techniques such as RSA will be pretty much useless. A quantum computer could factorise 600bit+ numbers in a relatively short period of time. Aside from Shor's algorithm, are there any other...- uperkurk
- Thread
- Computing Encryption Quantum Quantum computing
- Replies: 4
- Forum: Computing and Technology
-
S
'Advantages' of Quantum Encryption
I'm finding it absurdly difficult to get detailed information about the exact methods of transmitting quantum encrypted messages. I have a working understanding of quantum mechanics but I'm not a computer scientist. The most I can find is descriptions of QKD which use a quantum channel as well...- spenserf
- Thread
- Encryption Quantum
- Replies: 8
- Forum: Quantum Physics
-
C
Example of encryption key pair algorithm?
Greetings, I know that when encrypting something with the public key of a key pair, the encrypted data can only be decrypted with the private key of the pair. And it can not be decrypted with the public key that was just used. I do not understand how it is possible to perform a mathematical...- CosmicVoyager
- Thread
- Algorithm Encryption Example Pair
- Replies: 1
- Forum: Programming and Computer Science
-
C
Securing Messages with Client/Server Encryption
Create a program for client/server, and encrypt/decrypt messages by public/private keys.- cyber-girl
- Thread
- Encryption
- Replies: 2
- Forum: Programming and Computer Science
-
P
How Does Encryption Work? Explained
I read about methods of encryption and I guess that they work only when you are online. But, I was astonished to see Compress or Encrypt attributes in Properties --> General --> Advanced. Please explain what's the need of encrypting any folder and what happens when a folder is encrypted. Frankly...- physics kiddy
- Thread
- Encryption Works
- Replies: 1
- Forum: Computing and Technology
-
B
Trying to Develop a Decryption Scheme for a Given Encryption
Hello PF friends! Earlier this week a friend of mine (both of us are in the same mathematics department) posed an encryption mapping to me and I have thus far not been able to solve it. Here's the map of the k+1 layer: \lambda_n^{k+1} = (\sum_{i=1}^{n} \lambda_i^{k})\; mod\; 27, where...- BWElbert
- Thread
- Encryption
- Replies: 1
- Forum: Linear and Abstract Algebra
-
M
Encryption key and encrypted text
encryption key u ffhyaxwm vm dhxc wtvsybpvnsgfgintvsg zwkp tsvwtvsyxjwio nppmnrgtvjirqesnf uwzlcqksneqtfjycqb cwqownkyupj to clarify - the encryption key is 'encryption key' and the messages are plain text. I will be impressed if anyone solves this. In a few weeks I'll add the...- mathal
- Thread
- Encryption Text
- Replies: 6
- Forum: General Discussion
-
S
What's Wrong with My Simple Encryption Program in C?
Hi guys! I am writing a program that reads in a single sentence up to the period. The program outputs the modified sentence with all of the spaces removed and replaces each of the vowels with the letter 'Z'. Here is my code but I am stuck and I don't understand what's wrong, can anyone...- stellina
- Thread
- Encryption Program
- Replies: 8
- Forum: Engineering and Comp Sci Homework Help
-
B
What Is 128-Bit and 256-Bit Encryption?
Can anyone please explain me what's 128-bit and 256-bit encryption in layman's word (but bit in detail please). (I am a mechanical Engg. and have least knowledge on security aspects of IT). Thnx.- bhaazee
- Thread
- Bit Encryption
- Replies: 4
- Forum: Computing and Technology
-
P
How Does Simple Encryption Work in Java Programming?
Hello, My professor wants us to code a program that encrypts a massage and decrypt it , I know that to encrypt something you need a message and a key, and you assign a number to each letter or the message, and you do the same with the key, and then you add the two numbers together to get...- philippe311
- Thread
- Code Encryption Explanation
- Replies: 1
- Forum: Engineering and Comp Sci Homework Help
-
W
What Type of Encryption is Used in This Text?
Hi, I'm sure this will be completely obvious for someone, but it eludes me. What type of encryption is used in the following text? (this isn't homework) Ysq xaxrvl! W zsix yfi dmdxd kvaw obdvcl! A'q oxrp jwvr loifq xatt pcm wixnk mgyk mids uvtvkzby xabs, sil xabs yok rhmhzby xh wo nwll tgy...- wirrmartin
- Thread
- Encryption
- Replies: 9
- Forum: General Math
-
F
Is RSA Encryption Safe for Data Security?
I started by saying cince c = me mod n (1) then me ≡ c mod n Since this is true then mek ≡ cek-1 mod n and cek-1 = (me)ek-1 mod n, by (1) = mek mod n => k is a generator of e and so both are proved? Not sure.. Also I haven't a clue is it's dangerous or not...- Firepanda
- Thread
- Encryption Proof
- Replies: 1
- Forum: Calculus and Beyond Homework Help
-
N
How Secure is a Text Encryption Program Created with Visual Basic?
I taught myself to program a bit in Visual Basic. A while ago I made a text encryption program using my own methods and I was wondering how secure it would be. It uses a random number between 10-99 in the encryption process. The number is appended to the beginning of the message. For...- niko421
- Thread
- Encryption Program Text
- Replies: 1
- Forum: Programming and Computer Science
-
I
Modular Arithmetic - RSA Encryption
I got curious about RSA Encryption after the software signing key for TI-83s got cracked earlier this week and so I'm reading the wiki article about it[RSA]. I'm curious about a step so I'll fill in everyone and then highlight the step I'm not sure about. Key generation: 1. pick 2 prime...- ice109
- Thread
- Arithmetic Encryption
- Replies: 3
- Forum: General Math
-
D
Bit-commitment based on public-key encryption
Can any public-key cryptosystem be turned into a bit-commitment scheme? For example, if I encrypt a bit using my public key and send it to Bob, how can I cheat?- Dragonfall
- Thread
- Encryption
- Replies: 1
- Forum: Programming and Computer Science
-
J
How CD/DVD Encryption works - need details
hello We are currently doing a TIPE Project on our first year of Prepa ( http://en.wikipedia.org/wiki/Classe_Pr%C3%A9paratoire_aux_Grandes_%C3%89coles ) We are thinking of doing our project on DVD/CD's (The theme is Surfaces), we would need to explain with precision how the encryption is made...- JPC
- Thread
- Encryption Works
- Replies: 6
- Forum: Engineering and Comp Sci Homework Help
-
M
RSA Encryption Problem: Finding d Using Euclidean Algorithm
Homework Statement This is a problem my lecturer did in class but I'm a bit confused. We have 2 large primes p=137 and q=131, choose e = 3 n = pq = 137.131 = 17947 (p-1)(q-1) = 136.130 = 17680 Compute d = e-1 mod (p-1)(q-1) = 3-1 mod 17680 = 11787. This is where I'm confused. How did he get...- muso07
- Thread
- Encryption
- Replies: 2
- Forum: Calculus and Beyond Homework Help