Questions tagged as 'criptografia'

2
answers

Encryption with Java and PostgreSQL / MYSQL

Hello I have a question in my college project, in scope it says like this:  "Users and passwords can be stored in the database, using the bank's own encryption." Is the crypto in both default by MD5? In that case I need to use the MD5 crypto...
asked by 28.07.2015 / 19:16
1
answer

Store password in database

I have an application that needs to store passwords and get them again, ie is not just for login verification because the stored passwords will be used to provide access to another system (there is no access token for this system). A hash func...
asked by 10.02.2017 / 07:31
1
answer

Generate random characters safely

Hello, I'm new to javascript and I'm using the following function to shuffle characters from a string into a password generator I'm trying to develop: function shuffle(string) { "use strict"; var parts = string.split(''); for (var...
asked by 29.03.2017 / 23:05
4
answers

Turn MD5 MessageDigest into string

I'm trying to generate an MD5 hash using the MessageDigest class, but I can not correctly display the hash as a string. The result is a string of unknown characters. Below is the test code: import java.security.MessageDigest; import...
asked by 20.07.2016 / 14:31
2
answers

Encryption and its bits. How to explain?

I have this table of encryption taken from a book, however I did not understand how it works. Why is the number of alternative keys 2 raised to 32? Why does each bit fit 0 and 1? Why is the number needed to decrypt the number of bits minus...
asked by 09.06.2015 / 19:53
2
answers

Explain in a simpler way what these attacks are?

I'd like to know in a simpler way what these types of attacks are. Keylogger Brute force attack Rubber Hose Cryptanalysis Sql injection And please, if you can go deeper into the subject, you could tell me a simple example of how to...
asked by 23.05.2016 / 21:16
2
answers

Can Hashes be different for the same bytes?

I found a flaw or I'm not sure how to deal with hashes . I have two random arrays , one generated by one algorithm and one original. I'm trying to make the algorithm look EXACTLY the same as the original. I visually managed, with the same byte...
asked by 13.01.2018 / 05:27
2
answers

How to protect a decompilation assembly?

Nowadays there are a lot of changers and recompilers for .NET Framework, the guy goes there, makes an application and everyone who has a decompiler (for example IL Spy) can go there, select the Assembly and see all the source code of the applica...
asked by 10.03.2016 / 20:09
2
answers

What is the difference between Encoding, Encryption and Hashing?

I would like to understand the difference between Encoding , Encryption and Hashing and also examples of when using one or the other.     
asked by 27.05.2015 / 17:49
1
answer

Decrypt virus - vbscript

Option Explicit On Error Resume Next dim rbs309 dim tadjakmnmfrg4460 dim icsnvk206 dim wsmp1276 dim falkal1610 dim rfqgobyeyrp5319 dim gtxhgi5556 dim mll8810 dim qxat8709 dim hgurgqrv3280 dim baknqdo6857 dim cioslu3564 dim sndohhjq1214 dim lwwfai...
asked by 10.12.2015 / 22:30