public-key-encryption
What's a good way to encrypt data using an asymmetric key, that's available to both java and ruby?
I have a customer that wants to encrypt some data in his database (not passwords; this needs actual encryption, not hashing).The application which will be doing the encrypting/writing is in Java, but[详细]
2023-01-31 22:13 分类:问答integer factorization and cryptography
i know that public key cryptography uses pri开发者_StackOverflow社区me numbers, also know that two large(e.g. 100 digit) prime numbers (P, Q)are used as the private key,[详细]
2023-01-31 02:09 分类:问答Public key cryptography with user-chosen passwords?
The whole point is designing a simple system where users are able to send encrypted messages between them (with support from a server).[详细]
2023-01-31 00:08 分类:问答Heroku HIPAA Compliance
Is it possible to run apps on Heroku that are HIPAA compliant? More specifically, I need two apps, one that stores member information and another that stores private health information of the members.[详细]
2023-01-28 01:11 分类:问答If I give someone only the public key, can he write messages for himself?
I want to distribute license keys, which an application at the customer premi开发者_StackOverflowses will need to decode.[详细]
2023-01-27 13:43 分类:问答How to make a file that user can read, but not write?
I want to distribute s/w licenses as encrypted files. I create a new file every time someone buys a licence & email it out, with instructions to put it in a certain directory.[详细]
2023-01-26 19:37 分类:问答PGP Encryption file or text?
I have a csv file that required to be encrypted. I want to ask that is there any difference between encrypt the content and encrypt the fil开发者_运维技巧e? Or they are the same? Because our client do[详细]
2023-01-26 02:35 分类:问答Method to send an encryption key over an insecure connection?
I am using Botan utility to perform encryption. When I initialize my connection to a remote machine using SSH, I am able to trade keys over the secure SSH connection. However, sometimes I use inetd to[详细]
2023-01-25 23:47 分类:问答network connection using public key cryptography
When A sends dat开发者_如何学编程a to B over a network connection using public key cryptography, how does A achieve the goals of authentication, confidentiality ?In a case like this, A is using B\'s p[详细]
2023-01-25 07:44 分类:问答Client proof public key encryption
I want to set u开发者_运维技巧p an automated email of sensitive data to a non-techy client, and I\'m looking for some very easy to use public key encryption (or rather decryption) desktop software I c[详细]
2023-01-25 02:47 分类:问答