A new approach on protecting your internal IDs with a strong cryptographic schema and many other useful features. Inspired by HashIds.
BCrypt based key derivation function to improve BCrypt as a cryptographic primitive for password hashing and key derivation
Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages digest and HMAC.
If you can’t use authenticated encryption like AES+GCM, this article will show how and why to use AES+CBC with Ecrypt-then-Mac with HMAC.
While writing my own bcrypt library, I discovered a lot of odd things surrounding the bcrypt protocol.
A Java standalone implementation of the bcrypt password hash function. Based on the Blowfish cipher it is the default password hash algorithm for OpenBSD and other systems including some Linux distributions. Includes a CLI Tool.
In this article I will show you how to strengthen ProGuard’s name obfuscation, making it harder for an attacker the reverse engineer your…
What to consider when encrypting your data and how to correctly implement it with AES-GCM.
A shared preference implementation for confidential data in Android. Per default uses AES-GCM, BCrypt and HKDF as cryptographic primitives. Uses the concept of device fingerprinting combined with optional user provided passwords and strong password hashes.