Questions tagged [file-encryption]

The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.

The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.

178 questions
82
votes
3 answers

What is safer: ZipCrypto or AES-256?

Like in title: which one of these encryption methods (ZipCrypto, AES-256) is more secure and why? I am asking about it because I'd like to know which should be preferred when compressing files with Zip.
alex
  • 931
  • 1
  • 9
  • 12
27
votes
3 answers

Information leakage from the ecryptfs filesystem

I'm wondering what information might be leaked from the ecryptfs filesystem. This is what Ubuntu uses if you check the box for "encrypted home directory" when using the desktop installer, so is probably quite widely used. Key characteristics of…
Hamish Downer
  • 371
  • 3
  • 5
21
votes
4 answers

Is it safe to use file's hash as IV?

I'm encrypting some files using AES in CBC mode. I'm also using file's digest (SHA-1) to check that data is decrypted correctly (so I need to store it with file). Is it safe to use this digest as AES's IV and store it in the header of file? Or it…
18
votes
7 answers

How to check a file was encrypted (really & correctly)

I would like to audit how an implementation of an encryption algorithm is really performed with the following given data of the problem: the encryption mechanism is reversible (this isn’t a signature), the algorithm is pretended to be AES, but…
athena
  • 289
  • 1
  • 2
  • 7
17
votes
2 answers

Twofish vs. Serpent vs. AES (or a combo)

I've seen some posts and info online, but they are from 2009, 2010, 2011 or 2012, which is 3-6 years ago, which is a very long time. So I'm looking for an up-to-date answer about which of these is the safest encryption to be used, or rather most…
Jack
  • 273
  • 1
  • 2
  • 6
17
votes
1 answer

Is CAST5 still a secure algorithm to use?

I just installed GnuPG for Windows. The documentation says the default symmetric cipher is CAST5. In PGP also, default cipher was CAST5. Is CAST5 secure to use? Any known attacks reported on this algorithm?
RPK
  • 571
  • 2
  • 5
  • 12
16
votes
6 answers

Is the decompression of compressed and encrypted data without decryption also theoretically impossible?

We have two communication points in an information system, call them A(lice) and B(ackup). B has to store encrypted data received from A. The storage of B is encrypted, but not compressed1. B should have no option to decrypt the data of A2. However,…
peterh
  • 390
  • 5
  • 18
14
votes
2 answers

Which crypto libraries/programs do we have the most confidence in?

I have recently begun studying crypto. If it's one thing I have learned it's that we should not implement our own crypto. Therefore we should look to using existing software and libraries. When I go to implement something that needs data security,…
user9061
  • 149
  • 1
  • 3
13
votes
4 answers

Is it possible to get an RSA encryption key by comparing the unencrypted and encrypted file?

Exactly what the title says. If I have a RSA encrypted file, and the exact same file but decrypted, can I tell the key that was used from that information?
aaro4130
  • 141
  • 1
  • 1
  • 4
12
votes
1 answer

What is a safe maximum message size limit when encrypting files to disk with AES-GCM before the need to re-generate the key or NONCE

The general limits from the NIST recommendation are as follows: Maximum Encrypted Plaintext Size ≤ 239 - 256 bits; Maximum Processed Additional Authenticated Data ≤ 264 - 1 bits; This stack overflow answer…
10
votes
5 answers

Tamper-proofing log files

Problem Overview I want to securely store log files so the contents are secret, and they can't be modified without detection. The files will be encrypted using authenticated encryption (AES in GCM mode), with a random IV and symmetric key for each…
10
votes
3 answers

Best way to generate a IV for AES-CBC when encrypting files?

The situation is that I want to use symmetric encryption to store some info in files. I'm going to use AES-CBC algorithm. The user is going to remember the password (meaning it will not be stored anywhere but in the brain of the owner of the files)…
10
votes
3 answers

Encryption of big files in Java with AES/GCM

I have to encrypt big files. Say their size ranges from 500mb to several of gigabytes. I would like to use AES/GCM/NoPadding as provided by Java 1.8 since that gives me automatic authentication and encryption. I would like to use the handy Cipher…
alejo
  • 127
  • 1
  • 2
  • 7
9
votes
4 answers

Does exposing algorithm, key size and IV weaken the security?

I am using an encryption program to encrypt my documents. Previously I have used PGP and AxCrypt, so I just wanted to see how this new tool encrypts the file. This tool is keeping parameters like cipher name, key size,initialization vector etc. in…
RPK
  • 571
  • 2
  • 5
  • 12
8
votes
4 answers

Switching between AES and a highly performant algorithm

I want to de/encrypt several binary files rather frequently on a normally battery-powered device. My goal is to use AES-256 when the device is AC-powered and a highly performant algorithm when it's battery-powered to save power. I appreciate that…
Kar
  • 473
  • 3
  • 9
1
2 3
11 12