Questions tagged [Encryption] (563)

2
answers

Which algorithm to use to decode the data, which, in the transfer process deletes the bits (the data)?

Some error-correcting algorithm to use for decoding data in which, in the transfer process deletes the bits (the data)? The codec which that will restore. I need the name of this algorithm, software and other application are not needed. Thank you
Darren_Dooley asked April 19th 20 at 12:46
1
answer

BitmapFactory.DecodeFile returns null on Android version Lollipop and higher (Xamarin Android)?

Sawing the app on Xamarin. Normal activity with the vyuha. Encrypt files using the AES algorithm, the encryption method used here is a (decoding similar): public static void Encode(string inputPath, string outputPath, string _key, string _iv) { using (Aes aes = Aes.Create()) { aes.Key = Encoding.Unicode.GetBytes(_key); a...
nyasia_Klocko asked April 19th 20 at 12:42
1
answer

Will it brake the game if you encrypt the system and the usual local disk VeraCrypt?

Will it brake the game if you encrypt the system and the usual local disk VeraCrypt? Windows
Jack_Dach74 asked April 16th 20 at 11:14
2
answers

All the messengers with the "E2E", except for jabber, you can read your messages?

End-to-End encryption is when "whatever" server keys are generated in the clients, which is encrypted correspondence. But how can you be sure that if the client crashes "correspondence with Bob, encrypted with his key" - that is REALLY the key generated by Bob? Keys need to be exchanged bypassing the server, e.g. by email ...
oswald.Mante18 asked April 16th 20 at 11:07
3
answers

The use of encryption in an online game?

If encryption was used in contemporary online games, where you want from the server for maximum performance, for example in shooters? What encryption is most often used? Asymmetric or symmetric? What's it used for? Which encryption algorithms are used? Is there any ready solution for use?
Makayla_Okune asked April 16th 20 at 10:34
1
answer

How to make hidden partition in VeraCrypt leaving one public?

Want the flash was like a regular flash drive, but with a hidden partition. That is, not within Vera container was hidden, and next to normal. This can be done? Ie actually hide the partition one. And then insert the USB drive and the system says disk problem, you want to format?. So after formatnut you accidentally.
Aditya_Nitzsche asked April 16th 20 at 10:33
1
answer

Is there any free books about "Cipher machine of world war II"?

Can't find the literature. Language doesn't matter. Suddenly, someone on the computer lying around :)
carleton.Gusikowski asked April 16th 20 at 10:00
2
answers

As in RC6 entered text and key?

Hello, I have a rc5 implementation in c++(dragged with the Gita). Took to understand what is going on in this block cipher. On github I looked different implementations and rc5, and rc6. I still don't know how to do, you have entered the text? Know what the key is, for example, you need to enter the user, but in text form?...
Tara60 asked April 8th 20 at 10:41
0
answer

The encrypted disk is not displayed correctly?

Hi all. Faced with the problem: Encrypted laptop bitlockera system, which was in the MBR. After encryption it worked, but soon popped up a blue screen and after reboot the system ceased to see a disk. But in BIOS it is displayed in the boot option. I took out the laptop drive (M2 nvme) and inserted it into another PC where...
emmett.Crona asked April 8th 20 at 09:40
1
answer

As to generate digest?

Is this manual. I can not understand. Request headers Header X-Signature Electronic signature request To authorize requests of the terminal and attribution, the Protocol uses asymmetric cryptography with private and public key: ECDSA prime256v1 RSA 1024 RSA 2048 For the formation of message digest, use the hash function ...
alden.Cassin asked April 8th 20 at 02:59