encryption – Securing data stored on a file

Suppose I have an application, which when opened asks you to open a file and then “unlock” that file using a password that’s configurable by the user.

The file should be encrypted with something like AES-256, right? The key would be the password, but should the users password be hashed using something like SHA-256? Should I salt the hash as well? If I do salt the hash, do I just store the salt at the start of the file?

Is this the correct way to go about things?

client – custom encryption – Information Security Stack Exchange

client – custom encryption – Information Security Stack Exchange

Difference between Disk Encryption and Volume Encryption?

I’m trying to understand the different between disk encryption and volume encryption, more specifically as it relates to SAP HANA, link here.

From my understanding Disk Encryption prevents the threat where someone physically disks your server/disk. Once the VM is running it offers no additional protection as all data is in plaintext.

Volume encryption as per SAP’s solution states that:
If data volumes are encrypted, all pages that reside in the data area on disk are encrypted using the AES-256-CBC algorithm. Pages are transparently decrypted as part of the load process into memory. When pages reside in memory they are therefore not encrypted and there is no performance overhead for in-memory page accesses

If I’m interpreting this correctly it would seem that the data that is written to disk is encrypted using AES256, so even if someone could get access to the running server they will be unable to view the files unless they had the keys, which is different to disk encryption.

Any thoughts?

encryption – Any reason why SHA-3 isn’t yet present in GnuPG?

I was curious about setting SAH-3 as the preferred hashing algorithm for GPG but that looks like it is not yet supported and the documentation states this:
SHA-3: SHA-3 is a completely new hash algorithm that makes a clean break with the previous SHAs. It is believed to be safe, with no warnings about its usage. It hasn’t yet been officially introduced into the OpenPGP standard, and for that reason GnuPG doesn’t support it. However, SHA-3 will probably be incorporated into the spec, and GnuPG will support it as soon as it does.

What does this means: ...and GnuPG will support it as soon as it does? Are there any development plans for supporting SHA3 or BLAKE?

database – Best practices for “client-side” encryption within AWS Lambda

database – Best practices for “client-side” encryption within AWS Lambda – Software Engineering Stack Exchange

encryption – Opening .sa files from old android(broken) to newer android

I have some *.sa files on my devices. These files which were saved by me are either images or PDF. But these files do not open with a photo viewer or PDF reader. So how to open and read files these files on my device?

The device in which the files were initially stored was an Android which was transferred to another Android via SD card. These were important documents and images which were in a hidden album of Redmi 5 which due to some reason(fell in water) were transferred to another device (Android).

encryption – Can someone intercept my messenger calls

I want to know whether or not facebook messenger calls can be intercepted and listened to by hackers.

I would also like to know if my exact location can be found by hackers through them knowing my mobile phone number.

Long story, but I went on a date with a girl who I then blocked immediately afterwards due to me suspecting she was a bit of a psychopath (which the proceeding story will confirm), and then a couple of days later I was bombarded with phone calls from a private number in a robotic voice, from that girl, asking why I blocked her making threats, saying I’d get bashed and she would kill me – my exact house address was also found by her despite me never even telling her where I lived, and she actually got someone to pull up to my address to scare me at 2:00am when this was all happening. This was scary in and of itself, but what freaked me out even more was the fact that when I went onto my computer to make a call to my friend over messenger, telling him what was going on, we both heard the same robotic voice sending threats, and it was literally on the messenger call now that I was on on my computer, not on my mobile phone.

So I am going to be concerned if they can actually listen to what I was saying and potentially hack into my Facebook and other accounts.

But if it is easy to intercept a call and send messages into that call connection without actually hearing what the parties in the call are saying, then I won’t be shitting myself as much.

And by the way, my phone was on me the entire time we were out on a date. No way would she have been able to access it. I never told her my address. There is no way she could have installed software onto my phone. She only had my phone number, and I guess she could have found my LinkedIn page and Facebook account if she searched online, but none of which reveal my exact location. I blocked her on snapchat and I didn’t have my SnapMaps on so she couldn’t have figured out my location that way as well.

Please, any clarification on the severity of this matter in terms of my internet security would really be appreciated because this is quite distressing.

encryption – How to get Future Keys (Session Key) from IPEK for decryption data?

I’m new to DUKPT, so I’m not entirely clear about DUKPT and HSM. Right now, I’m trying to decrypt data (PAN number) from terminal.

So far, when I receive KSN and encrypted data, I understand that I need to find encryption key. From my HSM I can get IPEK based on (KSN, BDK). But here is the confusion, based on articles I read, and terminal vendor’s doc, encryption key will be one of the Future Keys.

  1. How would I know which Future Keys terminal uses as encryption key?
  2. How can HSM create Future Keys from IPEK?

Once I get correct Future Keys then I can derive data key variant and do decrypting in my HSM. I’m just stuck with these two questions.

Any explanation would be really helpful.

how can i decode this encryption [AOp//W4d2BF57veRpbIbZA==]?

the encryption: AOp//W4d2BF57veRpbIbZA==

it looks like base64 but it’s not

all I know is the plaintext 01006069622e

thanks beforehand!

Error when trying to apply Always Encrypted encryption on aspnet_Membership table

I’m trying to encrypt the Email and LoweredEmail columns on a SQL database using Always Encrypted encryption using SSMS and I always get the same error:

Lock request time out period exceeded. There is no user table matching the input name ‘(dbo).(aspnet_Membership)’ in the current database or you do not have permission to access the table.
I still get the same error when I log in as the SA account, sio I guess that it’s not a permissions problem.

SSMS select column
SSMS key
SSMS proceed
SSMS summery
SSMS error

EDIT *** Added the PowerShell Script

Import-Module SqlServer

$password = “”
$sqlConnectionString = “Data Source=GALADRIELSKYLINE;Initial Catalog=SkylineMembership;User ID=sa;Password=$password;MultipleActiveResultSets=False;Connect Timeout=30;Encrypt=False;TrustServerCertificate=False;Packet Size=4096;Application Name="Microsoft SQL Server Management Studio“”
$smoDatabase = Get-SqlDatabase -ConnectionString $sqlConnectionString

#Add-SqlAzureAuthenticationContext -Interactive

#Add-SqlAzureAuthenticationContext -ClientID ” -Secret ” -Tenant ”

$encryptionChanges = @()

$encryptionChanges += New-SqlColumnEncryptionSettings -ColumnName dbo.aspnet_Membership.Email -EncryptionType Deterministic -EncryptionKey “CEK_Auto1”
$encryptionChanges += New-SqlColumnEncryptionSettings -ColumnName dbo.aspnet_Membership.LoweredEmail -EncryptionType Deterministic -EncryptionKey “CEK_Auto1”

Set-SqlColumnEncryption -ColumnEncryptionSettings $encryptionChanges -InputObject $smoDatabase

DreamProxies - Cheapest USA Elite Private Proxies 100 Private Proxies 200 Private Proxies 400 Private Proxies 1000 Private Proxies 2000 Private Proxies ExtraProxies.com - Buy Cheap Private Proxies Buy 50 Private Proxies Buy 100 Private Proxies Buy 200 Private Proxies Buy 500 Private Proxies Buy 1000 Private Proxies Buy 2000 Private Proxies ProxiesLive Proxies-free.com New Proxy Lists Every Day Proxies123