GPG4WIN Kleopatra does not require RSA secret key components to decrypt

I was thinking of using gpg4win to encrypt files I’ll upload to cloud storage services. I already use 7-zip so if I just wanted to password protect my files I could have easily done it, but I wanted to implement TLS style asymmetric encryp… Continue reading GPG4WIN Kleopatra does not require RSA secret key components to decrypt

What are the different combinations of public and private keys and what CIA do they provide?

I am preparing for the Sec+, currently reading the book, "Mike Meyers …. Certification Passport"(book in question is irrelevant to the problem), In the cryptography chapter, topic-public key/asymmetric cryptography
It says

&qu… Continue reading What are the different combinations of public and private keys and what CIA do they provide?

How to manage a users private key in a secure document storage solution?

I’m in the process of building a secure document storage on behalf of users of a web and mobile application. The goal is to have end-to-end encryption, as in documents will be encrypted and decrypted on device, but not require users to man… Continue reading How to manage a users private key in a secure document storage solution?

Benefit of asymmetric encryption vs trivial alternatives in compromised software?

Background information:
I have a client application that communicates with a server through a web API.
The data being communicated is not personally sensitive (no passwords, credit card details, usernames, etc). It’s just challenge/respons… Continue reading Benefit of asymmetric encryption vs trivial alternatives in compromised software?

How to convert plaintext to element of cyclic group in Cramer-Shoup cryptosystem [migrated]

I am trying to implement a cramer-shoup cryptosystem but I don’t understand how to work with the plaintext I want to encrypt.
From what I understand, the plaintext needs to be converted to an element of the cyclic group G, which was genera… Continue reading How to convert plaintext to element of cyclic group in Cramer-Shoup cryptosystem [migrated]

Security vs. User Experience – can this Process still be considered to provide proper End-to-End-Encryption?

I am banging my head about this for a while now and would appreciate opinions/different views.
tl;dr
There is a system that aims to provide full end-to-end encryption for information (text messages, blobs) exchanged through it. At the mome… Continue reading Security vs. User Experience – can this Process still be considered to provide proper End-to-End-Encryption?