About 139,000 results
Open links in new tab
  1. Is password-based encryption better than traditional password …

    Feb 25, 2025 · I have a theoretical question regarding the comparison of password-based encryption and password hashing. Not sure if Stackoverflow or crypto is the best place, but …

  2. encryption - How safe is a password protected Excel file?

    Oct 25, 2022 · I currently use excel password protection on the file itself and the password I use is known by the 3rd party. However, today I read a thread on this forum that appears to say it is …

  3. Cisco IOS service password-encryption - Information Security …

    0 Service password-encryption will encrypt all the passwords in cisco router using type 7 encryption which is very weak and you could recover the password from the hash using many …

  4. What's the difference between a hashed and an encrypted …

    May 8, 2016 · Encryption is a reversible process: two functions, 'encryption' <-> 'decryption'; that which is encrypted can be decrypted if you have the key; decryption recovers the original …

  5. https security - should password be hashed server-side or client …

    183 If you hash on the client side, the hashed password becomes the actual password (with the hashing algorithm being nothing more than a means to convert a user-held mnemonic to the …

  6. Cisco IOS question - password management, service password …

    The encryption standard used by the service password-encryption command is referred to as type 7. This encryption standard is very weak and there are easily accessible tools on the Internet …

  7. encryption - Password checks in backend vs. password encrypted …

    Nov 21, 2024 · Strong authentication and (client-side) data encryption aren't mutually exclusive. You definitely should implement an authentication mechanism in the backend before you hand …

  8. Best way to know the algorithm used for a password encryption

    Mar 17, 2019 · Now, I don't know how to decrypt this password because I don't know which algorithm was used for its encryption. I have tried online free decryption tools, but none of …

  9. Encrypting With Passwords - Encryption of Key vs. Data

    May 11, 2015 · Encrypt data key with another key, "user key", based on user-provided password. When access is needed, user provides password. Password is used to recreate user key, …

  10. What security scheme is used by PDF password encryption, and …

    Aug 3, 2015 · 55 There are two types of PDF protection: Password-based encryption and User-Interface restrictions. You are describing the second type of protection, namely the missing …