1,159 Topics
![]() | |
# BlowFish? # BlowFish was the brain child of Bruce Schneier back in 93. Since BlowFish was released to the public domain, Bruce Schneier has released new encryption algorythems, TwoFish and ThreeFish. BlowFish is an increddibly popular and very strong algorythem. Because it conforms to Kerckhoffs's Principal [Explained Here](http://en.wikipedia.org/wiki/Kerckhoffs's_principle), even … | |
![]() | I need an idea for cloud computing graduation project. I was thinking about security and encryption , but most of the ideas are more suitable for a research rather than an application, so I am thinking of making a cloud-based embedded system. What kind of embedded systems can benefit from … |
HI, I am using zend guard for encryption of my php code. I would like to ask that is there a way to automate the process through command prompt or gui that we can zip the files of the source code and encrypted code in seperate folders automatically. Thanks in … | |
OK, I programmed a few DLLs using Linux years back. My memory (and my memory could be faulty), was that I had the program decide which dll to load based on user input. So I had two dlls, each with a `string encrypt(string, string)`function. The user was asked to specify … | |
I saw someone getting an assignment to implement the Vigenere Cipher, so I decided, just for the frig of it, to implement the Caesar Cipher. The algorithm below, however, doesn't account for spaces and punctuation. How can I account for those without redoing the whole thing? from random import choice … | |
I am not going to lie, this is for a class project but I am lost and can't figure out where things are going wrong. We were tasked with coding an RSA algorithim based off a lab we previously did in class. The lab and project description can be found … | |
I am using C language to encrypt a text file and decrypt it by the means of an AES Algorithm. This algorithm can only encrypts characters if they are stated in the format of an unsigned character where a letter A is represented by 0x41. what i am trying to … | |
Hi, Daniweb, it's been a while. I'm looking to do a mobile ssh-client (well, not quite a full client) that stores sensitive login information encrypted by a pattern-lock. However, I know very little about encryption. Can anyone recommend a good learning path - and by path, I mean Encryption for … | |
Bought an HP Elitebook 6930p at auction. It was dirt cheap beacuse it had some kind of HDD encryption on it and no one new what it was or how to crack it. When you booted it up all you saw was a bunch of numers in increments of 4. … | |
How is it that the government that tells us that they need a back door into encryption because the tool that we use to safeguard our privacy can also be used by "bad guys" for evil purposes, completely forgets this argument when it comes to guns? "Yeah, bad guys use … | |
Hello everyone, I am posting this more generically in the software development section to see what might be available and to increase a possible success rate. But enough of that let's get to the question at hand. Recently, in C#, I started back up a project of mine to do … | |
**Question:** Create a message encryption system application that translates every message character to its ASCII equivalent and pads the resultant code with a chosen random key based on an addictive operation. **Answer:** program Encrypt; type tab=array[1..255] of byte; function Sum(T:tab):integer; var i,s:integer; begin S:=0; for i:=1 to length(T) do s:=s+T[i]; … | |
Hi there, Routing is not working in codeigniter hostgator shared hosting. When i login www.doamain.com/admin this redirects to www.domain.com am using below in my config.php <?php if ( ! defined('BASEPATH')) exit('No direct script access allowed'); /* |-------------------------------------------------------------------------- | Base Site URL |-------------------------------------------------------------------------- | | URL to your CodeIgniter root. Typically … | |
I'm trying to design an encryption program in which the text is converted into its ASCII Code Equivalent and then uses math to change the text and then convert the result into its ASCII Char. I have managed to convert the string I wish to encrypt into its ASCII Code … | |
Hi Dw. Is it possible to search through "*.COM", "*.exe" files and check if they are encrypted and so check which encryption was used in VB.NET? | |
Hi, I was wondering if someone could help me please.... I am new to java and have been struggling with this for about 2 weeks now!! At the moment I am just trying to get the program to print out a 5x5 matrix with the alphabet in it, using a … | |
Hello, i need help with my project. Im making a program that encrypts and decrypts the contents of a text file. I had to generate an 8 character key which is converted to ascii and then calculate the offset factor of the key that was generated (New every time program … | |
Hello, I've been asked to create a tool using 3rd party API. The API requires to send the user details in encrypted format. The problem here, they didn't mention what kind of encryption we should do. They just provided a two C++ functions to encrypt the data. I'm a PHP … | |
Dear All, can some one share me a code with one simple cipher encryption, as i'm a noob i in this thing.... Thanks all. | |
This is a program for Encryption and Decryption This program uses the Simple Data Encryption Standard (SDES) Algorithm. This Algo takes 8-bits of plaintext at a time and produces 8-bits of ciphertext. It uses 10-bits of key for Encryption and Decryption. | |
Although objects collections have a place in the PHP world many years now , their use is now flourishing because more and more PHP programmers turn to OOP. This tutorial is a sequel of https://www.daniweb.com/programming/web-development/tutorials/500118/a-simple-data-layer-for-oop-php-applications (we will refer to it as “previous tutorial”) and https://www.daniweb.com/programming/web-development/tutorials/500118/a-simple-data-layer-for-oop-php-applications , in order to understand … | |
Hello Everyone Help needed, Has anyone implemented frequency analysis attack on caesar cipher in PHP and predicting the possible key for it. it should input the cipher text and predict the key using frequency analysis chart. | |
Hello, This tutorial is the next of “[A simple Data Layer for OOP PHP Applications](https://www.daniweb.com/programming/web-development/tutorials/500118/a-simple-data-layer-for-oop-php-applications)” so having read it and made your own tests is needed to understanding what we are doing. So far we have a Db object (child of PDO that standardize and simplifies its use) , a … | |
Hello everyone. This is my first post here on Daniweb. Recently I have been working on an AES encryption program using the OpenSSL library. I am running into a small problem, there seems to be a buffer overflow and I cant seem to find the problem area. Or atleast I … | |
https://www.eff.org/deeplinks/2015/09/one-small-certificate-web-one-giant-certificate-authority-web-encryption Let’s Encrypt is a free, automated, open-source certificate authority (CA). The goal is to revolutionize encryption on websites, making HTTPS implementation a seamless, no-cost option for anyone with a domain. Sounds interesting, what are your thoughts? | |
Has anyone seen/does anyone have a native PHP implementation of the TEA Tiny Encryption Algorithm? | |
I'm working on a simple encryption program (for school). It is not currently "homework" just FYI, I'm just practicing the examples in the book. It uses a Caesar's Cipher method (an alphabetical shift). I have not tested this code very much. If something is wrong with it I probably don't … | |
i am new in this encryption and decryption i would like to have my encryption appear on my database (currently using microsoft sql server) i create 3 forms : one for the registration which means when u will register, u will be able to access the 3 forms by entering … | |
News has broken this weekend that the personal data, including bank account details, of some 2.4 million customers of the Carphone Warehouse may have been compromised following a breach that the mobile phone retail giant is calling "a sophisticated cyber-attack." The company also warns that encrypted credit card data of … | |
[CODE]using System; using System.Security.Cryptography; using System.Text; public static class Encryption { public static string Encrypt(string input, string key) { byte[] inputArray = UTF8Encoding.UTF8.GetBytes(input); TripleDESCryptoServiceProvider tripleDES = new TripleDESCryptoServiceProvider(); tripleDES.Key = UTF8Encoding.UTF8.GetBytes(key); tripleDES.Mode = CipherMode.ECB; tripleDES.Padding = PaddingMode.PKCS7; ICryptoTransform cTransform = tripleDES.CreateEncryptor(); byte[] resultArray = cTransform.TransformFinalBlock(inputArray, 0, inputArray.Length); tripleDES.Clear(); return Convert.ToBase64String(resultArray, … | |
I want to encrypt and decrypt the password and username of my login table I already populate my login table with 5 rows Can anyone suggest some Encryption and decryption algorithms for Password protection? here is my current code Option Strict On Imports System.Data.SqlClient Public Class Frmlogin Private strCon As … | |
##How to set up file synchronization using BitTorrent Sync (part 1) There are a number of services that offer file sharing/syncing via the "cloud". The free versions come with limitations on file size. As well, DropBox suffers from security issues in that encryption is done at the server meaning that … | |
I'm tring to develope newcamd virtual server i have read the newcamd protocol documentation there is some missed Points the newcamd protocol uses 3des encryption 112bit CBC Mode point one : what is the padding mode?? point two : what is the vector key?? another thing for example i spyed … | |
I am getting : Warning: pack() [function.pack]: Type H: illegal hex digit s in D:\xampp\htdocs\project\includes\encryption.php on line 139 Warning: pack() [function.pack]: Type H: illegal hex digit s in D:\xampp\htdocs\project\includes\encryption.php on line 139 Warning: pack() [function.pack]: Type H: illegal hex digit s in D:\xampp\htdocs\project\includes\encryption.php on line 139 Warning: pack() [function.pack]: Type … ![]() | |
As [news breaks](http://www.usatoday.com/story/tech/2015/06/12/office-of-personnel-management-hack-china/71146452/) that a second breach at the federal Office of Personnel Management may have seen another set of data, potentially more valuable than that accessed during [the first](http://arstechnica.com/security/2015/06/why-the-biggest-government-hack-ever-got-past-opm-dhs-and-nsa/), Philip Lieberman, President of privileged identity management specialists [Lieberman Software](http://www.liebsoft.com/), has been talking about what went wrong. Here's what he … | |
So I've always toyed around with C# code with the idea of gaming. Lately I've been dabbling in communication. Initially I tried sockets and TcpClient and that was hit and miss. So I decided to give pipes a go. Frankly I dont have much of a preference of one of … | |
The Electronic Frontier Foundation (EFF) has released the latest version of its 'Who Has Your Back?' [report](https://www.eff.org/who-has-your-back-government-data-requests-2015) and accompanying infographic, and it makes for interesting reading. Once you appreciate that what the EFF is talking about here is how good, measured as a response to a handful of yes or … | |
Problem Statement: NAtural DIAlogue team at Orange labs has an abbreviation "Nadia Team". This abbreviation causes a big problem for them in Egypt as a lot of Egyptians think this team is owned by a female called nadia and they don't know they are working on NAtural DIAlogue. To solve … | |
Werner Vogel, Amazon Web Services (AWS) CTO, speaking at the AWS Summit in London yesterday has made the rather amazing claim that security in the cloud is "much stronger" than anything you can have on-premises. As someone who has been writing about information security for more than 20 years, and … | |
Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the … | |
which kind of password encryption is this mqqemZ0= ![]() | |
Hi i just wanna know if there are way to **decrypt a files that is infected and decrypted by a virus / malware**? all of the files from one of the workstation are encryted as in totaly you cannot open the files.there is a noted in there saying that i … | |
In what has quite possibly been one of the longest periods between security problems being revealed and action being taken, the Virginia Board of Elections voted on Tuesday to remove the certification of more than 300 AVS WINVote touchscreen voting machines. The Virginia Information Technology Agency, and consultancy Pro V&V, … | |
public void Start() { List<Object> list = new List<Object>(); List<Object> toRemove = new List<Object>(); if (File.Exists("c.bin")) { using (Stream osR = File.OpenRead("c.bin")) { DESCryptoServiceProvider cryptic = new DESCryptoServiceProvider(); cryptic.Key = ASCIIEncoding.ASCII.GetBytes("ABCDEFGH"); cryptic.IV = ASCIIEncoding.ASCII.GetBytes("ABCDEFGH"); try { using (CryptoStream crStream = new CryptoStream(osR, cryptic.CreateDecryptor(), CryptoStreamMode.Read)) { if (osR.Length > 0) { … | |
Hey guys, It's not exactly trouble with coding that I am facing more like trouble with understanding what I have to implement .. Quick background .. I am trying to implement statistical-saturation attack on block ciphers. The piper that describes the attack has the following algorithm that is used against … | |
i have an assignment and i need to encrypt the objects before serializing them into the file. i've looked for information and all i found was encrypting strings. is this my only option?to encrypt each field of the object and then assemble them all to the original object? Thanks. i … | |
Hi there, please help me to write script encryption/decryption in php? i am using below code for my encryption/decryption ... Please tell your suggesstions if there is security issues in this script. thanks.. $key_value = "prtiv24$"; $plain_text = "password"; $encrypted_text = mcrypt_ecb(MCRYPT_DES, $key_value, $plain_text, MCRYPT_ENCRYPT); // password encryption echo ( … | |
Security is, more often than not, a case of getting the basics right. This is certainly true of the cloud where the hyperbole surrounding insecurity far outweighs the actual risk in my opinion. Not that the cloud is an inherently secure place to store data, just that it poses similar … | |
It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser … | |
We have QA automation jobs that invoke user interface tests in Firefox running on a virtual Linux host. My tests perform regression, but I'm held up because of the Firefox This Connection is Untrusted warning. My current requirement is to ignore this connection untrusted warning, which comes up when accessing … |
The End.