[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Encryption

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Share tech news, updates, or what's on your mind.

Sign up to Post

We have a number of Dell laptops running Windows 7 with BitLocker enabled, along with TPM (+ PIN) activated.  We're now about to start upgrading these laptops to Windows 10. What I need to know is if I need to clear the TPM in the BIOS before re-imaging these laptops.

The Windows 10 deployment will be BitLocker encrypted as well.  But since we're going from Windows 7 (Legacy BIOS) to Windows 10 (UEFI), we're having to wipe and reformat the drives. So the existing encryption for the Windows 7 install is not really relevant. The laptop will be returned to the same user.  With a newly encrypted drive, should existing TPM keys be cleared and reset before re-encrypting?

I know how to clear the TPM. I don't know if I "need" to clear the TPM, or if I "should" should clear the TPM.

I did a test upgrade (via SCCM), without clearing the TPM. In Windows 10, TPM was listed as active, but with "Limited Functionality".  

I then manually disabled BitLocker, cleared the TPM from the BIOS (which required extra reboot and re-entry into the BIOS to re-activate TPM), and re-encrypted the drive. TPM no longer shows a status of "Limited Functionality". It now shows "ready to use" (no owner?). Did I do something wrong?

(and further down the rabbit hole I go) When retiring computers, should we clear TPM in the BIOS after wiping the disk on the computer that's being retired?  Or am I over-thinking this?

Sorry about the multiple questions.
0
Python 3 Fundamentals
LVL 12
Python 3 Fundamentals

This course will teach participants about installing and configuring Python, syntax, importing, statements, types, strings, booleans, files, lists, tuples, comprehensions, functions, and classes.

Hello -
A friend of mine has files on a USB drive that was infected with a virus. There was a ransomeware message stating their files were encrypted and asking them to pay a large amount of money if they want their files back. All of the files on the USB have a file extension of .pdf.zcdgu. Has anyone seen this before?  If so, is there a way to remove it?
0
I'm using manage-bde.exe to allow some power user to encrypt their USB Stick.
I have a DC (Windows Server 2012 R2) with 100 hunder windows 10 pro laptpos.
The users don't have admin privlege on their machines.
I found that changing  WMI privilege manually  (ROOT>CIMV2>Security>MicrofostVolumeEncryption) and adding manually the specif account and giving him  "execute method" privilege allow the user to run the encryption without possessing admin rights.

I'm trying to create a script that I'm going to push via GPO to apply the needed changes.
I tried using this method  without success.
I can dump the privlege. Applying them give no errors but no changes are done.
Both operations are done with local admin account.
Thanks.
0
Hello experts,

I have a 3rd party vendor and they are asking me to send them PGP public key. they want to transmit the file and encrypt it using this public key I should be providing them and they sign it with a file that is an *pgp_public.asc file, they sent me the file.

My question is how to generate PGP public key? and what do I do with this file that they are using to sign the files. what is the process of viewing this file after receiving it from the 3rd party.

Thanks,
0
PGP for free?

Absurd question maybe but if I Google for "PGP Windows x86 32 bit" I am not presented with a list of freeware products but presented with several paid for products. I am a cheapscate  and expect everything for free including a PGP encrypter program for my crappy 32 bit Windows version 10 notepad.

So where do I go to (my lovely) to get free encryption for my Windows 10.0 32 bit craptop tablet?
0
Would like to assess the data analytics solution in terms of security/risk for service below
(which uses Cloud):

"AAA Solutions, a local- based data and analytics consultancy, provides Information Management and Analytics support to our clients. Our seasoned practitioners bring established tried and trusted models developed through years of practical hands-on implementation and successful project delivery of Data Warehouse, Business Intelligence & Analytics systems. We apply an optimum mix of descriptive, diagnostic, predictive and prescriptive methods to drive business value, cost efficiencies and manage risk.
    To establish the Forecasting & Analytics System (FAS) integrating with the top-of-the-line Business Intelligence system and automation of the external variable extraction process to streamline analytics workflow.
    Data Source is using Qlik N-printing;
    Data Integration & Transaction svcs is using MS SSIS;
    Data Marts layer is by MS SQL 2017;
    Power BI is by O365;
    our on-prem AD sync to O365 AD"

Can only currently think in terms of encryption of data in transit, at rest & at endpoint.
What about data integrity (ConnectDirect did checksumming), cloud security (esp this one)?

I like MS SQL 2017 (as MS SQL 2016 only offers DB encryption in Enterprise Edition) offers
DB encryption even for the non-Enterprise edition
0
Hello
does anyone know if there is a decryptor for ransomware extension ending in bgtx.. it is a variation of dharma encryption.
0
Hello Experts!

I need your assistance with an issue concerning Java Encryption. What I am trying to do is to get the BlowFish method to function in the class file so that it can run, and output a following in Java:

Wil Wheaton is my hero!

cux,ctqm€{z,u,y…,tq~{-

Wil Wheaton is my hero!

 
mycleverpassword

mxyschlmezvievrppeaysisvwcoorydc

mycleverpassword

What i'm looking for is output for the cleverpassword part but running into issues with cannot use non-static method, symbol, and does not over-ride abstract method. The method that I am using is implementing to the interface Encryptable for both files, excluding the driver and the Encryptable file itself. The Encrypt file is an Interface class and is implemented in the other two class files Secret and Password. The problem is the password file and the driver file.




Your help(s) is most appreciated.
0
We are using Gpg4Win to decrypt files we download from Concur.  The files are encrypted using the key we provided them.  We need to be able to download these files from any one of eight servers.  We have installed GpgWin4 on another server where we expect users to download the files and decrypt them.  This is our first of eight servers deployments.  We are not having success with decrypting the files.  We did use Kleopatra to import our files.  We created the personal key so we could certify but we did not publicize any keys.  We cannot get past this error:  gpg:  decryption failed: No secret key.  We know we have not done something correctly, but we do not have a clue.  Hoping to get some help here.
0
Hi Experts,
can someone explain the procedure for generating certificates.

I am new to this I want to Generating private key for SFTP connection, i have a file that has a *.asc extension and i want to generate to private key and send it to third party.

Thank you,
0
OWASP: Forgery and Phishing
LVL 12
OWASP: Forgery and Phishing

Learn the techniques to avoid forgery and phishing attacks and the types of attacks an application or network may face.

Hi, i have problem whith download Decrypting Cryakl from https://www.experts-exchange.com/articles/31579/Decrypting-Cryakl-1-4-0-0-1-4-1-0-FAIRYTAIL-Ransomware.html  (and decryptors.blogspot.com). Can help me whith download application?
I want test on CL 1.5.1.0. I have one pc whith this encryptor. I know that he was installed through the RDP, and have some files and log's. Maybe you decryptor can help.
It will then be possible to transfer the information to others.

Thank you.
0
Dear expert support

We have issue and required your help : we are implement Bitlocker feature with the users ( different PC models )  90 % is working fine but the issue with 10 % is asking the key every reboot.

Note: this issue dont related to computer model , generally with different models

Regards
0
I want to password protect my external hard drive and pen drive. I tried searching online but not able to figure out best and safest way for doing this. I dont want to encrypt my entire data. Just a password protection is enough. Any good and free tool available for accomplishing this? Thanks.
0
What are the steps necessary to determine if a certificate is 128 bit or 256 bit?
0
Hello

This is Azizah Alqahtani

I just sent you email like this bellow and you response to give you the python code ..


Could you please help me to solve this problem,

I have to convert a python code to a Java code

Or rewrite the code with the same idea ?


The code is about one type of substitution cipher ?

If you can , I will send you the assignment page and my friend’s answer in python..


Regards..
Assignment1Python.zip
0
I have an issue where I'm seeing a discrepancy between what ShareFile is stating the storage consumption is to what is actually being consumed on our storage array.  ShareFile states 4 TB of usage while the storage array is reporting 27 TB.

Citrix support has told me that our version, 4.1 has an issue with deletion and suggested we upgrade to 5 to which we are working on new servers to replace the old.  We have been through 3 different versions from 3.0 upwards.

What concerns me is looking at the array I see multiple files of the same size but none of them equal to the highest size file we have shared.  It appears to me that the files are being broken up into pieces during the encryption process.

I'm new to ShareFile but not storage; my apologies if this is scatter brained...

Has ShareFile always had an issue with file deletion prior to 5.0?
Could ShareFile encryption be causing the overhead due to splitting files?
The NTFS cluster size is set for 15K and not 4K; this would cause overhead but could it account for that large of a difference?
Is it possible that the NTFS cluster size and file splitting with encryption is causing it?
Is there a way to correlate the file ID to a set of split files?

Any help is greatly appreciated.  Please query me for additional information as needed.  23 TB is a considerable amount of space to be waisted and has an associated cost.
0
I forgot the zip password of a file that I previously zip (think with AES256) :
any free tools to unzip/crack it & will it be faster to do it if I use a i7
computer with SSD?
0
I have a client with a windows 10 home edition os. He has come to us asking for a recommendation for encryption software to load on it.
My understanding is that because it is Windows 10 Home Edition, that he cannot load Bit Defender.
I am looking for some feedback as to whether anyone can recommend encryption software for this version of Windows 10 or as we already know, that he has to have Windows 10 Pro for Bit Defender to work.
1
Backed up a MAC to Time Machine with encryption enabled. Backup complete now its encrypting data which my understanding takes awhile, much longer than the backups. I turned off Time Machine hoping it speeds up the encryption process. Question, I hoped to do a rebuild on the MAC and reinstall the OS after the backup. Will I be able to recover my data (don't want to re-image from the backups just recover data) prior to the encryption process finishing? It's been on 6% for awhile.
backup
0
Learn Ruby Fundamentals
LVL 12
Learn Ruby Fundamentals

This course will introduce you to Ruby, as well as teach you about classes, methods, variables, data structures, loops, enumerable methods, and finishing touches.

Hi - I have a client that travels a lot with her laptop and has sensitive data on it.
I suggested that we encrypt the hard disk so that the data is protected should it fall into the wrong hands.
The problem is that she is running Windows 7 Pro and therefore does not have Bitlocker on there. I am only familiar with the latter program when encrypting, so i wondered which software , preferably free (if reliable) otherwise paid, would you suggest.

Thanks
D
1
Does anyone have James's decryption software for email-blackdragon43@yahoo.com.ver-CL 1.4.1.0
Your help would be apreciated. TY
0
HELP PLEASE...
We are centralising departmental data from local file servers across Europe into a new File Server in Azure in view of GDPR.

We've locked down Azure disks with Encryption (KeyVault), BitLocker etc. and we have enabled the following settings on the Azure File Server for user access to Shares;
  • Enable access-based enumeration
  • Allow caching of share
  • Enable BranchCache on the file share
  • and Encryp
t data access

We have successfully migrated some data and presented users with a 'Drive Map' via Group Policy, and locked down access as you do with AD Security Groups.

The issue we have is that Windows 10 users are fine, but none of the Windows 7 Users are able to receive the Mapped Drive, and we cannot manually map the drive without getting the 'Access Denied' message.

I have found out though that when the 'Encrypt data access' setting is disabled (unticked) on the Azure File Server we don't get the 'Access Denied' message and can map drives.

However, this setting needs to be enabled (GDPR) and the reason for it not working is because Windows 7 uses SMB version 2.1 and the Azure (2016) server uses SMB version 3.0 as a minimum for SMB Encryption.

We have around 1,000 users on Windows 7 so without upgrading those users to Windows 10 right now how can we get round this issue ensuring the 'Encrypt data access' option is enabled and Windows 7 users can access the data?
In advance thank you for your support.
0
Can anyone recommend an full disk encryption software with a management console that will work with GPT disk on a windows 7 professional machine. Rebuilding / Upgrading the machine to Windows 10 isn't an option currently.

I have already looked at Symantec encryption and Sophos Safeguard both these dont work with the above

Any help would be greatly appreciated.

Thanks
Stephen
0
Ransomware Nozelesn
Is there a good decryption tool available for this ransomware encryption?
0
Hi, I have a issue with PCI Compliance Scanning and Sonicwall weak encryption setting.  I believe all weak settings had been disabled or updated to stronger, but PCI scanning continuously find following: Mode: Main, Encryption: 3DES, Hash type: MD5, Auth method: GSS or XAUTH1, DH Group: Group 14.
Anyone who experience same? Thanks for all of you!
0

Encryption

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.