Posts

Showing posts from January, 2023

RSA Encryption

RSA  Obfuscation For the same security, an elliptic curve algorithm (such as ECDSA) requires a smaller key length than RSA. On the other hand, RSA has been used for a long time, everyone knows how to write Java code and process data. But strong RSA requires increasingly longer encryption keys. In real commercial use of the RSA encryption algorithm, extremely high security can be achieved by using data obfuscation. Here this is not the usual obfuscation of the code, but the transformation of the correct code into "wrong". When the decryption keys or ciphertext are deliberately corrupted and the decryption operation cannot be performed. There can be a large number of processing options. Two code for such processing will not be too big. For example - repositotry https://github.com/vallshmeleff/androidrsa File https://github.com/vallshmeleff/androidrsa/blob/main/RSACode.java   Method   public String ObfuscationD ( String SourceText , String e , String d ) This is the e...

SQLite and RSA

 RSA or ECC RSA may no longer be as strong an encryption algorithm as ECC, but there are some things that can be done to make it very resistant to hacking. At the same time, the main part of the data can be encrypted by the "built-in" software of the Android OS using RSA. Very curious if anyone can hack the following text: "tyubbgh,llet5gcghu8jhxwrtred9lmjnvvtr5gg4dwelmmb75"   Unlikely And all because the text was "masked" without using any logic. Randomly selected bytes were replaced by others. And the replacement option is known only to the receiving party. Those. the text was encrypted and deliberately corrupted. It can be either text or a decryption key. The problem of the stability of any encryption algorithm is the complexity of the logic used. And if there is no logic in the data initially, then it cannot be decoded directly. https://github.com/vallshmeleff Obfuscation