Should nonce / IV be private as a key? [closed] - cryptography

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about programming within the scope defined in the help center.
Closed 8 years ago.
Improve this question
In block cipher modes the nonce / iv and counters are introduced ( http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation). Should they also be private as a key and why?

No, the nonce/IV are just there to provide distinct outputs provided the same input plaintext.
There's no requirements to keep them confidential (but they shouldn't be guessable or re-used usually), and in most protocols, e.g. TLS >= 1.1, it's something sent in clear at the beginning of every encrypted message.

Related

How can I verify that my TLS server is encrypting traffic? [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 4 years ago.
Improve this question
I've set up a TLS server in Go using a custom generated certificate/key pair. Is there an easy way for me to test that the content of my HTTP requests to this server is indeed encrypted when it gets sent out over the network? For my own sanity I'd like to compare and contrast the content of the packets when I use TLS vs normal HTTP.
You can use a sniffer, here are two: Charles Proxy, it has a 30 day free trial period and is easy to use. Or WireShark, it is free and you will hate using it.

Why would one need to verify a download | SHA-256 checksum [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about programming within the scope defined in the help center.
Closed 6 years ago.
Improve this question
So, recently when downloading an update, I saw the option that stated:
'Download and verify the file SHA-256 checksum.'.
My question(s):
What is the purpose of this?
How is it beneficial(if question 1 doesn't answer this) ?
Who would need to make use of this ?
Can you point me to some literature in this regard ?
Thanks.
The purpose is to ensure the integrity of the file arrived exactly as it was intended.
2 reasons I am aware of:
A) file was not corrupt in transit,
B) file was not intercepted and modified in transit, having said that if someone is able to modify the download in transit then modifying the checksum in transit should not be a problem for them either.
Only situation I can imagine B would be useful is if the downloads are transmitted over HTTP whereas the SHA has was delivered over HTTPS.

Difference between IPFS and Filecoin? [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about programming within the scope defined in the help center.
Closed 5 years ago.
Improve this question
They both seems to store files in a decentralized network. So what's the difference between them in terms of data structure and algorithms they use? And also what's the difference between them in terms of use cases?
If I store a file in IPFS or Filecoin, will it remain there forever or it may get lost?
IPFS does storage and content-based addressing. Filecoin is just a way to incentivize people to store IPFS content.
So it's not really easy to tell the difference because they are not comparable. Filecoin just works on top of IPFS.

Does SSH Key-Based Authentication Depend on The User Account? [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 9 years ago.
Improve this question
I would like to know if the public key depends on the used account. In other words, do I really have to use the same account on the server and the client when I add my public key (id_rsa.pub) in authorized_keys on the server?
Thanks.
The accounts don't matter. All that matters is that the client key is in the server account's authorized_keys file.

Will Microsoft make exceptions on their BizSpark entry requirements [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about programming within the scope defined in the help center.
Closed 5 years ago.
Improve this question
The company I work for is about three and a half years old but we haven't started developing software until recently. Is the less than three years old rule absolute or will they make exceptions?
I don't realy know if that's the reason you are interested in bizspark but if you sign up for the free software through this:
http://www.asp.net/downloads
and then follow the links on the e-mails, you can get legitimate copies/keys of the software!