Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the usage of the lower export strength cipher without the user being aware and which impacts something like eight per cent of the top one million web domains and all the major web browser clients. Well almost, because Internet Explorer has already been patched (nice one Microsoft) with Firefox expected to …

Member Avatar
+2 forum 0

I have an XML file that is in this format: <root> Test string <Signature> WvZUJAJ/3QNqzQvwne2vvy7U5Pck8ZZ5UTa6pIwR7GE+PoGi6A1kyw==</Signature> </root> I was able to produce the SHA256 and produced a string by using the following: string CalculateSHA256(const string& input) { SHA256 hash; string digest; StringSource _(input, true, new HashFilter(hash, new HexEncoder (new StringSink(digest)))); return digest; } In the documentation I have it mentions that a signature can be verified by using PKCS, SHA256, and a public key. I have the public key and like i mentioned about SHA256, but I cannot find a way to produce the signature. I have the string of what …

Member Avatar
Member Avatar
+0 forum 7

Here is capital letter style caesar crypted message. We can simply try all possible shifts for first few words (ignoring punctuations, which is left as is). If both first words succeed we assume we cracked it. You could also use Vigenère encryption, but keeping non-letters is less simple, our Vigenère drops all non-letters (including numbers). You need some english word dictionary saved as dict.txt in same directory as you save this code.

Member Avatar
Member Avatar
+1 forum 1

I did some transformation of overcomplicated Rosetta code version

Member Avatar
+0 forum 0
Code Snippet One line Caesar

I was not happy of solution [url]http://chaos.weblogs.us/archives/331[/url] for one line Ceasar cipher, so I wrote my own version without import by using raw_input (change to input for Python3). Chance to play little with memoryview object also. Crypt: give displacement amount for shift Decrypt: give -displacement amount shift

Member Avatar
Member Avatar
+0 forum 3

Hi I have a problem with RSA encryption/decription of txt files, I have one method to create a pair of RSA keys and save them into a file, then i made two methods, one for encryt and one for decrypt, encrypt method works fine, but when I want to decrypt it shows this exception javax.crypto.BadPaddingException: Data must start with zero, any help would be very apreciated. Heres the code for create the RSA keypair into a file: [CODE]public void generateKeys() throws NoSuchAlgorithmException, NoSuchProviderException, FileNotFoundException, IOException{ int keysize = 1024; KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA"); SecureRandom random = SecureRandom.getInstance("SHA1PRNG", "SUN"); keyGen.initialize(keysize, random); …

Member Avatar
+0 forum 0

Back in 1976, along with Stanford University professor Martin Hellman, Whit Diffie produced quite possibly the most important paper in the history of cryptography. That paper, New Directions in Cryptography, laid the groundwork for solving one of the fundamental problems of cryptography, that of key distribution. Now Diffie himself is taking a different direction by joining the Internet Corporation for Assigned Names and Numbers (ICANN) as Vice President for Information Security and Cryptography. In his new role, Diffie will provide advice on general security matters related to ICANN's mandate, and to ICANN in the design, development and implementation of security …

Member Avatar
Member Avatar
+0 forum 1

Some might argue that it has been a bad year for encryption. After all, just as the last decade was ending came reports that the algorithm that is used to encrypt GSM mobile phone calls (as used by some 4 billion people around the world) had been cracked wide open. Now this has been followed by the announcement that 768-bit RSA encryption has been cracked. I'm inclined to think that this is a good thing, and am happy to explain why starting with GSM encryption. The GSM Association responsible for developing the algorithm in the first place responded by stating …

Member Avatar
Member Avatar
+3 forum 3

The End.