Member Avatar
I saw someone getting an assignment to implement the Vigenere Cipher, so I decided, just for the frig of it, to implement the Caesar Cipher. This is what I ended up with: ...
by Mickey_2 9 in Programming ()
Member Avatar
Hi, Daniweb, it's been a while. I'm looking to do a mobile ssh-client (well, not quite, but almost) that stores sensitive login information encrypted by a pattern-lock. However, I know very little about encryption. Can anyone recommend a good learning path - and by path, I mean Encryption for Dummies …
by DeanMSands3 57 in Computer Science ()
Member Avatar
Do you anybody know when the full version of Windows 10 will arrived
by AmritaHasan11 in Microsoft Windows ()
Member Avatar
Hi Dw. Is it possible to search through ".COM", ".exe" files and check if they are encrypted and so check which encryption was used in VB.NET?
by Mr.M 32 in Software Development ()
Member Avatar
News has broken this weekend that the personal data, including bank account details, of some 2.4 million customers of the Carphone Warehouse may have been compromised following a breach that the mobile phone retail giant is calling "a sophisticated cyber-attack." The company also warns that encrypted credit card data of …
by happygeek 1,608 in Mobile and Wearables ()
Member Avatar
Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the …
by happygeek 1,608 in Community Center ()
Member Avatar
which kind of password encryption is this ...
by blueguy777 in Web Development ()
Member Avatar
It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser …
by happygeek 1,608 in Web Development ()
Member Avatar
Hi,so I am supposed to encrypt a text file chosen by a user at the moment I have completed most of it (offset factor/shift), I have got each separate character from the text file and put it into a list and converted it into ASCII, I am wondering how you …
by joshuawilson11 in Software Development ()
Member Avatar
In his essay '' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York Times piece about the NSA …
by happygeek 1,608 in Hardware and Software ()
Member Avatar
How are keys and passwords stored in a computer to make them secure? If encryption is used to secure keys and passwords - won't there need to be a key or password for it also? Will that one be encrypted as well? It seems to me that eventually there will …
by Sphinx'LostNose in Software Development ()
Member Avatar
With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. …
by vegaseat 1,720 in Software Development ()
Member Avatar
American technology companies are by implication evil, and aiding terrorist groups such as Islamic State/ISIS according to a number of highly influential but terribly ill-informed Western players. Apple and Google have become the command and control networks of choice for terrorists and implementing full-device encryption by default will help Islamic …
by happygeek 1,608 in Community Center ()
Member Avatar
BlowFish? BlowFish was the brain child of Bruce Schneier back in 93. Since BlowFish was released to the public domain, Bruce Schneier has released new encryption algorythems, TwoFish and ThreeFish. BlowFish is an increddibly popular and very strong algorythem. Because it conforms to Kerckhoffs's Principal ... , even though the …
by J.C. SolvoTerra 109 in Software Development ()
Member Avatar
Email encryption uses digital certificates to authenticate and encrypt and decrypt the message. When a message is encrypted, the public key to decrypt it is sent along with the message to the recipient, the recipient then uses the public key to decrypt the message. If the message was intercepted couldnt …
by iConqueror 27 in Computer Science ()
Member Avatar
Is it possible to create an encryption algorith using C#?
by iConqueror 27 in Software Development ()
Member Avatar
Hello Daniweb, I'm rebuilding a Flash-based website in PHP/HTML maintaining the same MySQL database. My problem now is, the user passwords are hashed of course - I need to use the same hash in the new application for old users to be able to still log in. But since the …
by Excizted 67 in Software Development ()
Member Avatar
Hi. I've developed a bit of an interest in encryption as well as programming in Haskell since I last used this forum. So I decided to build a symmetric block cipher and test its properties to gain more of an understanding of such things. This is for research purposes as …
by Mushy-pea 36 in Computer Science ()
Member Avatar
Hi, I have tried googling and searching for this but just find endless information about why software/hardware based encryption is the better option; what I need to know is whether there are any problems using BOTH. We want our offsite backups have to be as secure as possible. We previously …
by Ryshad 480 in Hardware and Software ()
Member Avatar
Last year, CryptoLocker ransomware after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it targets the people …
by happygeek 1,608 in Information Security ()
Member Avatar
Hi Guys I have an asp.net application developped using C# asp.net 4.0 , It is running perfectly with .net inbuilt server , but it throws an exception when running on IIS server 5.1 (Win XP sp-3) There i have a connection string encryption method , that is the place it …
by Sumith Asanka in Web Development ()
Member Avatar
I have been turning my USB thumb drives into fully encrypted data containers for years now, but readily admit that the prospect of rolling up your sleeves and getting down and dirty with encryption software is not as exciting to everyone as it is to me. However, with removable USB …
by happygeek 1,608 in Hardware ()
Member Avatar
Hi, i recently begun learning java and encryption. I found some code from a website that is supposed to decrypt lastlogin files found in minecraft. When i try to compile it gives me these errors: This is the entire program: Could anyone please tell me what these errors mean?
by Arin_1 in Software Development ()
Member Avatar
I am trying to make a program that generates source code for a much larger program for simple reversal encryption. I don't know what I am doing wrong. Here is my code so far: please help, thank you
by gruntler in Software Development ()
Member Avatar
So as part of my computer science course, we have been instructed to build an encryption process. I have a good knowledge on different encryption methods (RSA for example), however I am having a hard time trying to create my own. Now, before anyone says it, I know, using homebrew …
by CJMW 5 in Computer Science ()
Member Avatar
Just curious about your thoughts on this subject. Example: www.site.com/?id=1 or www.site.com/?id=8adyfa8df614812yasdf (which is also "1", but encrypted) What would you recommend? What do you use? Anyone with pros and/or cons on if you should encrypt your URL data? My thoughts: Pros (to encrypting URL data): - Makes it harder …
by minitauros 151 in Web Development ()
Member Avatar
I am using Formidalbe Pro on my wordpress site. Users are sending me a form that I make editable by them and by me (Its all managed by Formidable). They have to be logged-in with wordpress to fill the form and edit it. No anonymous access. I want to encrypt …
by nacedo in Web Development ()
Member Avatar
What is the usage of "preg_replace('/\x13\x00*$/', '', $plain_text);" ?
by sriramkarthick -1 in Web Development ()
Member Avatar
Does anyone know if there is a way in which I can install my own Encryption Algorithm into a MySQL database?
by squeak24 in Databases ()
Member Avatar
Hi.I have an image(A) and encrypted image(B) .I want to find correlation coefficient for(Horizontal,Vertical,Diagonal) A(~1)and for B(~0)is there any function in matlab for this ?I know corr2 is for calculating the correlation coefficient for two images.but for one image?
by sszz in Computer Science ()