Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it targets the people who are least likely to be in a position to do anything but pay; the people who are most likely to get infected are the same folk who are least likely to have an offsite backup or know how to get help with such a problem. This …

Member Avatar
Member Avatar
+2 forum 13

# BlowFish? # BlowFish was the brain child of Bruce Schneier back in 93. Since BlowFish was released to the public domain, Bruce Schneier has released new encryption algorythems, TwoFish and ThreeFish. BlowFish is an increddibly popular and very strong algorythem. Because it conforms to Kerckhoffs's Principal [Explained Here](http://en.wikipedia.org/wiki/Kerckhoffs's_principle), even though the algorithem is public domain, it still isn't crackable without the key. # It Isn't Mine, I Just Converted It. # I'm far from a maths genius, far, far from it. My only involvement in this class is converting from VB6 and wrapping. I have tried to comment the …

Member Avatar
Member Avatar
+0 forum 1

HI, I am using zend guard for encryption of my php code. I would like to ask that is there a way to automate the process through command prompt or gui that we can zip the files of the source code and encrypted code in seperate folders automatically. Thanks in advance

Member Avatar
+0 forum 0

I saw someone getting an assignment to implement the Vigenere Cipher, so I decided, just for the frig of it, to implement the Caesar Cipher. The algorithm below, however, doesn't account for spaces and punctuation. How can I account for those without redoing the whole thing? from random import choice from string import ascii_lowercase # for both encryption algorithms use negative offset to decrypt def caesar_cipher(text, offset): '''encrypts text with offset provided by user''' text, key = text.casefold(), ascii_lowercase cipher = [key[(key.index(char) + offset) % 26] for char in text if char in key] return cipher def caesar_cipher_rnd(text): '''generates and …

Member Avatar
Member Avatar
+0 forum 2

Hi, Daniweb, it's been a while. I'm looking to do a mobile ssh-client (well, not quite a full client) that stores sensitive login information encrypted by a pattern-lock. However, I know very little about encryption. Can anyone recommend a good learning path - and by path, I mean Encryption for Dummies followed by Encryption for People Who've already Read the Dummies Book and so on. From my limited google-searching, I found the Bouncy Castle API and I'm looking into that. Thanks.

Member Avatar
Member Avatar
+0 forum 2

**Do you anybody know when the full version of Windows 10 will arrived**

Member Avatar
Member Avatar
+0 forum 59

Hi Dw. Is it possible to search through "*.COM", "*.exe" files and check if they are encrypted and so check which encryption was used in VB.NET?

Member Avatar
Member Avatar
+0 forum 2

News has broken this weekend that the personal data, including bank account details, of some 2.4 million customers of the Carphone Warehouse may have been compromised following a breach that the mobile phone retail giant is calling "a sophisticated cyber-attack." The company also warns that encrypted credit card data of up to 90,000 customers may have been accessed during the breach. Scotland Yard and the Information Commissioner's Office have both been notified, along with a security outfit specialising in forensic examination of such attacks. However, the statement from Carphone Warehouse, released on Saturday, and revealing that the compromised personal details …

Member Avatar
Member Avatar
+1 forum 7

Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the usage of the lower export strength cipher without the user being aware and which impacts something like eight per cent of the top one million web domains and all the major web browser clients. Well almost, because Internet Explorer has already been patched (nice one Microsoft) with Firefox expected to …

Member Avatar
+2 forum 0

which kind of password encryption is this mqqemZ0=

Member Avatar
Member Avatar
+0 forum 4

It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser have moved one step closer to an Internet that encrypts all the world's traffic with a new feature that can cryptographically protect connections even when servers don't support HTTPS. The 'Opportunistic Encryption' (OE) feature essentially acts as a bridge between non-compliant plaintext HTTP connections and fully compliant and secure HTTPS …

Member Avatar
+1 forum 0

Hi,so I am supposed to encrypt a text file chosen by a user at the moment I have completed most of it (offset factor/shift), I have got each separate character from the text file and put it into a list and converted it into ASCII, I am wondering how you are meant to change the ASCII number 32(space) into an actual space to separate the list and only them. Then i will need to create a string based on this and save it onto the user's computer and i am not too sure how to do this either. Any help/advice …

Member Avatar
Member Avatar
+0 forum 4

In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York Times piece about the NSA 'Bullrun' [briefing sheet](http://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html?_r=1&) which quite plainly states that the agency has been circumventing exactly the type of encryption protection of everyday Internet communications that we take for granted, such as SSL (Secure Sockets Layer). Of course, as Green has hinted at here, it's not the …

Member Avatar
Member Avatar
+3 forum 5

How are keys and passwords stored in a computer to make them secure? If encryption is used to secure keys and passwords - won't there need to be a key or password for it also? Will that one be encrypted as well? It seems to me that eventually there will have to be a key or password that is not secure to get the whole process going.

Member Avatar
Member Avatar
+0 forum 3

With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. Hopefully, we can improve the code as time goes on. The first example is very simplistic form of a Caesar cipher, simply increasing the ASCII values by one to encrypt and decreasing by one to decrypt. It would be easy to figure that scheme out by looking at the letter …

Member Avatar
Member Avatar
+3 forum 31

American technology companies are by implication evil, and aiding terrorist groups such as Islamic State/ISIS according to a number of highly influential but terribly ill-informed Western players. Apple and Google have become the command and control networks of choice for terrorists and implementing full-device encryption by default will help Islamic State to plan future attacks, if we are to believe certain spy masters and career politicians. I use the term 'terribly ill-informed' wisely, and am aware that I will no doubt get plenty of flack from those who think the head of the UK Government Communications Headquarters (GCHQ) or Director …

Member Avatar
Member Avatar
+4 forum 2

Email encryption uses digital certificates to authenticate, encrypt and decrypt the message. When a message is encrypted, the public key to decrypt it is sent along with the message to the recipient, the recipient then uses the public key to decrypt the message. If the message was intercepted couldnt the attacker just get the public key from withing the certificate?

Member Avatar
Member Avatar
+0 forum 3

Is it possible to create an encryption algorith using C#?

Member Avatar
Member Avatar
+0 forum 9

Hello Daniweb, I'm rebuilding a Flash-based website in PHP/HTML maintaining the same MySQL database. My problem now is, the user passwords are hashed of course - I need to use the same hash in the new application for old users to be able to still log in. But since the Flash-based application is compiled and I don't know what method was used, I'm kinda lost. Maybe there is no easy way to recognize the hashing method, but hoping someone knows more than me I am posting this asking for your suggestion. When I create a dummy user with password '**123456789**' …

Member Avatar
Member Avatar
+0 forum 2

Hi. I've developed a bit of an interest in encryption as well as programming in Haskell since I last used this forum. So I decided to build a symmetric block cipher and test its properties to gain more of an understanding of such things. This is for research purposes as they say. I'm not planning to use it with any sensitive data, but I thought it would be interesting to set a little challenge. The code is below together with a description, an example ciphertext and key for demonstration. There is then another ciphertext which contains a Bitcoin address (holding …

Member Avatar
Member Avatar
+1 forum 9

Hi, I have tried googling and searching for this but just find endless information about why software/hardware based encryption is the better option; what I need to know is whether there are any problems using BOTH. We want our offsite backups have to be as secure as possible. We previously used backup software that 256bit encrypted the output files. These were written to external drives with 256bit hardware encryption so we had 2 layers of protection for the data. Due to changes in our server configuration we are looking to use the built in windows server backup, but this does …

Member Avatar
Member Avatar
+0 forum 2

Hi Guys I have an asp.net application developped using C# asp.net 4.0 , It is running perfectly with .net inbuilt server , but it throws an exception when running on IIS server 5.1 (Win XP sp-3) There i have a connection string encryption method , that is the place it throws the exception any body no an idea to sort out this issue private void EncryptConnstring() { Configuration config = WebConfigurationManager.OpenWebConfiguration("~"); ConnectionStringsSection constrsec = (ConnectionStringsSection)config.GetSection("connectionStrings"); constrsec.SectionInformation.ProtectSection("DataProtectionConfigurationProvider"); config.Save(); }` <configuration> <connectionStrings configProtectionProvider="DataProtectionConfigurationProvider"> <EncryptedData> <CipherData> <CipherValue>AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAA/UYu3PJMHE+dbcAnqpdQZQQAAAACAAAAAAADZgAAqAAAABAAAABfRyTE1R2Qx1TfIRfGIRC+AAAAAASAAACgAAAAEAAAAADBnHaL/dOqgKh1L/imlIuIAQAAlajBlxThs+ygnm7Y0dmb6o9p5PWzb6Vyc8f6KEFAJPJgfCmKjUz/ak2VafQRFfFZYMWiIcs38FeXhl5JtRg1A+Wll/Kh6cOJK+fjKS4UTJ6+nWY6UfnFZzlJUqMfIGIyyRfkzAxNobBpY08SVCNPwwSDizYMXLSnIVaE3b2VHK2o8IW/Rl1p8N4QDltFgeqFuNX8ysqnphpf4MHJuEE/MHpN5RV9zqSfpN6FCEcqseaWI7r5BsXaZn32uR8RKV6zAIAzjSF6Nl/wFUalouu/PDJEouP7yJjs74bjgsJVkZoVSHVnfybrcsyClly1CoIevnG4DwbGHLlGQbKOYtDmzR9uA6LGZqnL3im9OjxqvNG8k7B07LZrmITCBcdaK6uKNBQpjRuSFN6G9nFl/CL7yk+epL9QWF9SS7Z2IEZ9cr2EI1pJ2XcyP7cWJbkzAyzvGivwFTFwwrGkXMkMmNdKAcQhKDGmkLAcpk6v0fExY2uvrOn8RvvfH86hpnSO+08VNauTC4NprtcUAAAAHSPGE+6ROzfqNi8ZaCo01o3yRWA=</CipherValue> </CipherData> </EncryptedData> </connectionStrings> thanks regards sumith

Member Avatar
+0 forum 0

I have been turning my USB thumb drives into fully encrypted data containers for years now, but readily admit that the prospect of rolling up your sleeves and getting down and dirty with encryption software is not as exciting to everyone as it is to me. However, with removable USB data storage devices having hit the pricing point where they have well and truly become commoditized and the data stored upon them of increasing value to those who would cause you financial injury, it really isn't safe to carry data around unencrypted; so what to do if DIY encryption isn't …

Member Avatar
+0 forum 0

Hi, i recently begun learning java and encryption. I found some code from a website that is supposed to decrypt lastlogin files found in minecraft. When i try to compile it gives me these errors: C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:54: error: invalid method declaration; return type required public MineCraftLoginReader() { C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:87: error: illegal start of type return "name: "+dis.readUTF()+NEWLINE+"password: "+dis.readUTF(); C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:87: error: ';' expected return "name: "+dis.readUTF()+NEWLINE+"password: "+dis.readUTF(); C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:87: error: illegal start of type return "name: "+dis.readUTF()+NEWLINE+"password: "+dis.readUTF(); C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:87: error: ';' expected return "name: "+dis.readUTF()+NEWLINE+"password: "+dis.readUTF(); C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:87: error: invalid method declaration; return type required return "name: "+dis.readUTF()+NEWLINE+"password: "+dis.readUTF(); …

Member Avatar
Member Avatar
+0 forum 1

I am trying to make a program that generates source code for a much larger program for simple reversal encryption. I don't know what I am doing wrong. Here is my code so far: #include<stdio.h> int main() { FILE *fp; fp=fopen("d:\\crypt.h", "w"); fprintf(fp, "char out[8];char cur[8]; char con[255,255,255,255,255,255,255,255];/n if cur==con out==0,0,0,0,0,0,0,0;/n while(cur <= con) /n con=con-1/n if cur>=con out=out+1; "); return 0; } please help, thank you

Member Avatar
Member Avatar
+0 forum 2

So as part of my computer science course, we have been instructed to build an encryption process. I have a good knowledge on different encryption methods (RSA for example), however I am having a hard time trying to create my own. Now, before anyone says it, I know, using homebrew methods for data encryption is dangerous and should not be used. That is not the purpose of the assignment. All we need to do is create something that works. Thanks for any replys!

Member Avatar
Member Avatar
+0 forum 3

Just curious about your thoughts on this subject. **Example:** www.site.com/?id=1 or www.site.com/?id=8adyfa8df614812yasdf (which is also "1", but encrypted) What would you recommend? What do you use? Anyone with pros and/or cons on if you should encrypt your URL data? **My thoughts:** Pros (to encrypting URL data): - Makes it harder for unwanted people to guess ID's, and thus you will have a safer application. - Noone will have the real access keys to your data, as long as they don't know how you've encrypted the URL data. Cons: - Longer URL's. - Uglier URL's. - Need for extra security checking …

Member Avatar
Member Avatar
+1 forum 1

I am using Formidalbe Pro on my wordpress site. Users are sending me a form that I make editable by them and by me (Its all managed by Formidable). They have to be logged-in with wordpress to fill the form and edit it. No anonymous access. I want to encrypt the data they send on the database and I want a way that the data could be decrypted by only me and by the user so it can be modifiable... What kind of encryption and how could I manage to implement that ? Here is the Formidable Pro hooks : …

Member Avatar
Member Avatar
+0 forum 2

What is the usage of "**preg_replace('/\\x13\\x00*$/', '', $plain_text);**" ?

Member Avatar
Member Avatar
+0 forum 4

Does anyone know if there is a way in which I can install my own Encryption Algorithm into a MySQL database?

Member Avatar
Member Avatar
+0 forum 2

The End.