I am looking for some suggestions on how to secure access to a RESTful API which initially be used by an iPhone application, but will have other clients in the future. The data exposed by this API mus
This question already has answers here: How do I securely store encryption keys in java? [closed] (4 answers)
Primality Check is probably one of \"those\" tough problems in mathematics. So, whats is the best and fastest algorithm available to check the primality of a huge number. The most crude and the slowes
Does anybody know some simple authentication and data transfer protocol based 开发者_如何学Pythonon symmetric keys only? Due to memory constraints (kilobytes RAM and ROM) we cant afford asymmetric cry
I am in the process of rewriting an old application.The old app stored data in a scoreboard file that was encrypted with the following code:
I have earlier asked a related question here. I have come up with a scheme which I shall describe below. I request experts out there to provide feedback.
this is probably a n00b question, but I don\'t really have any experience in this area. I need to create a p12 bundle containing an X509 certificate and the private key.I currently have two objects,
Should I b开发者_JS百科reak the text into chunks? Is RSA the wrong encryption scheme?Wrong scheme. The standard technique for message encryption (for example, PGP and CMS) is to generate a random sym
I need to create a program which will show how elliptic curve cryptography works. I was considering using Java Swing to create the GUI, but the main problem is what tool to use to plot the elliptic cu
I was wondering - is there any disadvantages in using the hash of something as a salt of itself? E.g. hashAlgorithm(data + hashAlgorithm(data))