Questions tagged [sha256]

SHA-256 is a hashing algorithm.

178 questions
0
votes
1 answer

Passwords processed on server side?

So while I was working on my personal project something struk me. When somebody creates an account on any web service/social media they provide their desired username and password,this is then processed by the server, the username is stored in a BD…
EChan42
  • 111
  • 2
0
votes
1 answer

Find SHA256 if I only have part of the string

I need to find the SHA256 hash of s string like this: "part1-part2". I know the SHA256 hash of part1 and I know what part2 represents, but I don't know what is the contents of part1. Is there any chance I can compute the hash of the whole string…
Daniel
  • 111
  • 3
0
votes
1 answer

Can SHA1 certificate be used for SHA256 cipher?

I have two Windows 2008 R2 domain controllers configured with TLS 1.2. Both certificates are SHA1-RSA. I captured network traffic between two DCs while running LDAPS (LDP.EXE). It seems TLS 1.2 was agreed but the cipher it was used TLSCipherSuite:…
Silver
  • 1
0
votes
1 answer

Do any browsers support Server Name Indication (SNI) but NOT SHA-2?

Yes, I know that SHA-2 signature validation is typically done by the operating system (with Mozilla Firefox/NSS and Chrome as of v39 being the exception).
Patrick
  • 207
  • 3
  • 4
0
votes
2 answers

should I add a sha256 signature to an AES_256_CBC encrypted token?

currently I generate a token for an mobile app the way below. I decrypt the token to process the request and assess the user is logged in. I'm on TLS RSA 2048 bits connection. I was wondering if $GLOBALS is safe and if adding an hmac_sha256 would…
-1
votes
1 answer

How to encrypt by AES-Twofish-Serpent

I was wondering how to encrypt by doing a AES-Twofish-Serpent encryption. Does this mean I encrypt in AES first then after that in Twofish, and after that in Serpent (three separate encryptions). In truecrypt they talk about cascading in xts…
abden003
  • 181
  • 9
-1
votes
2 answers

How can I make a program to verify file integrity?

How to make a program that calculates a checksum of a file? What is the exact process of calculating a checksum?
-1
votes
3 answers

Are GPG, PBKDF2 and SHA256 all AES?

As far as I understand what defines an AES is you use the same private key for encrypting and decrypting. Do all GPG, PBKDF2 and SHA256 lay under this category? PBKDF2 I know for a fact it is, but what is the differences between them? thanks
RollRoll
  • 183
  • 1
  • 1
  • 7
-2
votes
4 answers

Getting password cracking time and byte storage from bruteforce?

I am stuck with this question, you can see it in the picture I have included below. PARTS (a and b) I know a-z will be 26^8, A-Z will be 26^8 guesses, and 0-9 will be 10^8 guesses. But I can't relate guesses to time, I need help. PART c) Password =…
-2
votes
1 answer

SHA256 Encrypting with Value

Is it possible to encrypt a value (such as "hello world") with itself ("hello world") using an encrypting technique such as SHA256? Is that safe to do or would it be easily compromised?
ds_secret
  • 101
  • 4
-3
votes
1 answer

Sum two SHA256 to get a SHA512

I see this code in a web game SHA512(SeedServer + "|" + SeedUser) and I'm trying to reproduce this hash. I tried in PHP:
-3
votes
1 answer

which algorithm/hash can possibly encrypt and decrypt certain data regardless of size?

I have intercepted some data for which i don't know which algorithm has been used to encrypt this data, this data has been for sure encrypted before transmitting, to decrypt the data i should certainly must find the algorithm being used as well key…
OScam
  • 1
  • 2
-12
votes
1 answer

Someone help me decode this

What type of hash is this? a9df6dcd35f4e7223ff3dd087abcc266 I can't find anything when I decrypt it. Please someone decrypt it
nanda
  • 3
  • 1
1 2 3
11
12