1,159 Topics

Member Avatar for
Member Avatar for J.C. SolvoTerra

# BlowFish? # BlowFish was the brain child of Bruce Schneier back in 93. Since BlowFish was released to the public domain, Bruce Schneier has released new encryption algorythems, TwoFish and ThreeFish. BlowFish is an increddibly popular and very strong algorythem. Because it conforms to Kerckhoffs's Principal [Explained Here](http://en.wikipedia.org/wiki/Kerckhoffs's_principle), even …

Member Avatar for zen_1
0
1K
Member Avatar for A.M.H

I need an idea for cloud computing graduation project. I was thinking about security and encryption , but most of the ideas are more suitable for a research rather than an application, so I am thinking of making a cloud-based embedded system. What kind of embedded systems can benefit from …

Member Avatar for jwenting
0
309
Member Avatar for saadi06

HI, I am using zend guard for encryption of my php code. I would like to ask that is there a way to automate the process through command prompt or gui that we can zip the files of the source code and encrypted code in seperate folders automatically. Thanks in …

0
184
Member Avatar for AssertNull

OK, I programmed a few DLLs using Linux years back. My memory (and my memory could be faulty), was that I had the program decide which dll to load based on user input. So I had two dlls, each with a `string encrypt(string, string)`function. The user was asked to specify …

Member Avatar for AssertNull
0
238
Member Avatar for Mickey_2

I saw someone getting an assignment to implement the Vigenere Cipher, so I decided, just for the frig of it, to implement the Caesar Cipher. The algorithm below, however, doesn't account for spaces and punctuation. How can I account for those without redoing the whole thing? from random import choice …

Member Avatar for Mickey_2
0
287
Member Avatar for kyle.mace.35

I am not going to lie, this is for a class project but I am lost and can't figure out where things are going wrong. We were tasked with coding an RSA algorithim based off a lab we previously did in class. The lab and project description can be found …

0
147
Member Avatar for alegatross

I am using C language to encrypt a text file and decrypt it by the means of an AES Algorithm. This algorithm can only encrypts characters if they are stated in the format of an unsigned character where a letter A is represented by 0x41. what i am trying to …

Member Avatar for alegatross
0
714
Member Avatar for DeanMSands3

Hi, Daniweb, it's been a while. I'm looking to do a mobile ssh-client (well, not quite a full client) that stores sensitive login information encrypted by a pattern-lock. However, I know very little about encryption. Can anyone recommend a good learning path - and by path, I mean Encryption for …

Member Avatar for stultuske
0
308
Member Avatar for james.rodd

Bought an HP Elitebook 6930p at auction. It was dirt cheap beacuse it had some kind of HDD encryption on it and no one new what it was or how to crack it. When you booted it up all you saw was a bunch of numers in increments of 4. …

Member Avatar for gemsvidhi
0
831
Member Avatar for Reverend Jim

How is it that the government that tells us that they need a back door into encryption because the tool that we use to safeguard our privacy can also be used by "bad guys" for evil purposes, completely forgets this argument when it comes to guns? "Yeah, bad guys use …

Member Avatar for rproffitt
0
450
Member Avatar for JOSheaIV

Hello everyone, I am posting this more generically in the software development section to see what might be available and to increase a possible success rate. But enough of that let's get to the question at hand. Recently, in C#, I started back up a project of mine to do …

Member Avatar for rubberman
0
438
Member Avatar for David_65

**Question:** Create a message encryption system application that translates every message character to its ASCII equivalent and pads the resultant code with a chosen random key based on an addictive operation. **Answer:** program Encrypt; type tab=array[1..255] of byte; function Sum(T:tab):integer; var i,s:integer; begin S:=0; for i:=1 to length(T) do s:=s+T[i]; …

Member Avatar for David_65
0
376
Member Avatar for praba_web

Hi there, Routing is not working in codeigniter hostgator shared hosting. When i login www.doamain.com/admin this redirects to www.domain.com am using below in my config.php <?php if ( ! defined('BASEPATH')) exit('No direct script access allowed'); /* |-------------------------------------------------------------------------- | Base Site URL |-------------------------------------------------------------------------- | | URL to your CodeIgniter root. Typically …

Member Avatar for praba_web
0
4K
Member Avatar for Samuel_Watson

I'm trying to design an encryption program in which the text is converted into its ASCII Code Equivalent and then uses math to change the text and then convert the result into its ASCII Char. I have managed to convert the string I wish to encrypt into its ASCII Code …

Member Avatar for rproffitt
0
241
Member Avatar for Mr.M

Hi Dw. Is it possible to search through "*.COM", "*.exe" files and check if they are encrypted and so check which encryption was used in VB.NET?

Member Avatar for Mr.M
0
480
Member Avatar for catby

Hi, I was wondering if someone could help me please.... I am new to java and have been struggling with this for about 2 weeks now!! At the moment I am just trying to get the program to print out a 5x5 matrix with the alphabet in it, using a …

Member Avatar for catby
0
887
Member Avatar for ThePlacid

Hello, i need help with my project. Im making a program that encrypts and decrypts the contents of a text file. I had to generate an 8 character key which is converted to ascii and then calculate the offset factor of the key that was generated (New every time program …

0
211
Member Avatar for v1shwa

Hello, I've been asked to create a tool using 3rd party API. The API requires to send the user details in encrypted format. The problem here, they didn't mention what kind of encryption we should do. They just provided a two C++ functions to encrypt the data. I'm a PHP …

0
125
Member Avatar for Misar

Dear All, can some one share me a code with one simple cipher encryption, as i'm a noob i in this thing.... Thanks all.

Member Avatar for JOSheaIV
0
248
Member Avatar for Luckychap

This is a program for Encryption and Decryption This program uses the Simple Data Encryption Standard (SDES) Algorithm. This Algo takes 8-bits of plaintext at a time and produces 8-bits of ciphertext. It uses 10-bits of key for Encryption and Decryption.

Member Avatar for overwraith
1
13K
Member Avatar for jkon

Although objects collections have a place in the PHP world many years now , their use is now flourishing because more and more PHP programmers turn to OOP. This tutorial is a sequel of https://www.daniweb.com/programming/web-development/tutorials/500118/a-simple-data-layer-for-oop-php-applications (we will refer to it as “previous tutorial”) and https://www.daniweb.com/programming/web-development/tutorials/500118/a-simple-data-layer-for-oop-php-applications , in order to understand …

Member Avatar for jkon
2
853
Member Avatar for thirsty.soul

Hello Everyone Help needed, Has anyone implemented frequency analysis attack on caesar cipher in PHP and predicting the possible key for it. it should input the cipher text and predict the key using frequency analysis chart.

Member Avatar for cereal
0
1K
Member Avatar for jkon

Hello, This tutorial is the next of “[A simple Data Layer for OOP PHP Applications](https://www.daniweb.com/programming/web-development/tutorials/500118/a-simple-data-layer-for-oop-php-applications)” so having read it and made your own tests is needed to understanding what we are doing. So far we have a Db object (child of PDO that standardize and simplifies its use) , a …

Member Avatar for jkon
4
619
Member Avatar for SomeProgrammer

Hello everyone. This is my first post here on Daniweb. Recently I have been working on an AES encryption program using the OpenSSL library. I am running into a small problem, there seems to be a buffer overflow and I cant seem to find the problem area. Or atleast I …

0
126
Member Avatar for pritaeas

https://www.eff.org/deeplinks/2015/09/one-small-certificate-web-one-giant-certificate-authority-web-encryption Let’s Encrypt is a free, automated, open-source certificate authority (CA). The goal is to revolutionize encryption on websites, making HTTPS implementation a seamless, no-cost option for anyone with a domain. Sounds interesting, what are your thoughts?

Member Avatar for happygeek
1
221
Member Avatar for dawbin

Has anyone seen/does anyone have a native PHP implementation of the TEA Tiny Encryption Algorithm?

Member Avatar for pritaeas
0
80
Member Avatar for Curious Gorge

I'm working on a simple encryption program (for school). It is not currently "homework" just FYI, I'm just practicing the examples in the book. It uses a Caesar's Cipher method (an alphabetical shift). I have not tested this code very much. If something is wrong with it I probably don't …

Member Avatar for Curious Gorge
0
240
Member Avatar for Christopher_12

i am new in this encryption and decryption i would like to have my encryption appear on my database (currently using microsoft sql server) i create 3 forms : one for the registration which means when u will register, u will be able to access the 3 forms by entering …

Member Avatar for Reverend Jim
0
315
Member Avatar for happygeek

News has broken this weekend that the personal data, including bank account details, of some 2.4 million customers of the Carphone Warehouse may have been compromised following a breach that the mobile phone retail giant is calling "a sophisticated cyber-attack." The company also warns that encrypted credit card data of …

Member Avatar for happygeek
1
564
Member Avatar for Jazerix

[CODE]using System; using System.Security.Cryptography; using System.Text; public static class Encryption { public static string Encrypt(string input, string key) { byte[] inputArray = UTF8Encoding.UTF8.GetBytes(input); TripleDESCryptoServiceProvider tripleDES = new TripleDESCryptoServiceProvider(); tripleDES.Key = UTF8Encoding.UTF8.GetBytes(key); tripleDES.Mode = CipherMode.ECB; tripleDES.Padding = PaddingMode.PKCS7; ICryptoTransform cTransform = tripleDES.CreateEncryptor(); byte[] resultArray = cTransform.TransformFinalBlock(inputArray, 0, inputArray.Length); tripleDES.Clear(); return Convert.ToBase64String(resultArray, …

Member Avatar for hunny1
0
9K
Member Avatar for Christopher_12

I want to encrypt and decrypt the password and username of my login table I already populate my login table with 5 rows Can anyone suggest some Encryption and decryption algorithms for Password protection? here is my current code Option Strict On Imports System.Data.SqlClient Public Class Frmlogin Private strCon As …

Member Avatar for Reverend Jim
0
322
Member Avatar for Reverend Jim

##How to set up file synchronization using BitTorrent Sync (part 1) There are a number of services that offer file sharing/syncing via the "cloud". The free versions come with limitations on file size. As well, DropBox suffers from security issues in that encryption is done at the server meaning that …

1
842
Member Avatar for belalhamdy

I'm tring to develope newcamd virtual server i have read the newcamd protocol documentation there is some missed Points the newcamd protocol uses 3des encryption 112bit CBC Mode point one : what is the padding mode?? point two : what is the vector key?? another thing for example i spyed …

Member Avatar for Zurab
1
759
Member Avatar for abhi10kumar

I am getting : Warning: pack() [function.pack]: Type H: illegal hex digit s in D:\xampp\htdocs\project\includes\encryption.php on line 139 Warning: pack() [function.pack]: Type H: illegal hex digit s in D:\xampp\htdocs\project\includes\encryption.php on line 139 Warning: pack() [function.pack]: Type H: illegal hex digit s in D:\xampp\htdocs\project\includes\encryption.php on line 139 Warning: pack() [function.pack]: Type …

Member Avatar for diafol
0
2K
Member Avatar for happygeek

As [news breaks](http://www.usatoday.com/story/tech/2015/06/12/office-of-personnel-management-hack-china/71146452/) that a second breach at the federal Office of Personnel Management may have seen another set of data, potentially more valuable than that accessed during [the first](http://arstechnica.com/security/2015/06/why-the-biggest-government-hack-ever-got-past-opm-dhs-and-nsa/), Philip Lieberman, President of privileged identity management specialists [Lieberman Software](http://www.liebsoft.com/), has been talking about what went wrong. Here's what he …

Member Avatar for jwenting
2
463
Member Avatar for nunntb473

So I've always toyed around with C# code with the idea of gaming. Lately I've been dabbling in communication. Initially I tried sockets and TcpClient and that was hit and miss. So I decided to give pipes a go. Frankly I dont have much of a preference of one of …

0
227
Member Avatar for happygeek

The Electronic Frontier Foundation (EFF) has released the latest version of its 'Who Has Your Back?' [report](https://www.eff.org/who-has-your-back-government-data-requests-2015) and accompanying infographic, and it makes for interesting reading. Once you appreciate that what the EFF is talking about here is how good, measured as a response to a handful of yes or …

1
395
Member Avatar for Utopia_1

Problem Statement: NAtural DIAlogue team at Orange labs has an abbreviation "Nadia Team". This abbreviation causes a big problem for them in Egypt as a lot of Egyptians think this team is owned by a female called nadia and they don't know they are working on NAtural DIAlogue. To solve …

Member Avatar for David W
-3
174
Member Avatar for happygeek

Werner Vogel, Amazon Web Services (AWS) CTO, speaking at the AWS Summit in London yesterday has made the rather amazing claim that security in the cloud is "much stronger" than anything you can have on-premises. As someone who has been writing about information security for more than 20 years, and …

Member Avatar for dlhale
1
451
Member Avatar for happygeek

Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the …

2
337
Member Avatar for blueguy777
Member Avatar for ehpratah

Hi i just wanna know if there are way to **decrypt a files that is infected and decrypted by a virus / malware**? all of the files from one of the workstation are encryted as in totaly you cannot open the files.there is a noted in there saying that i …

Member Avatar for Slavi
0
340
Member Avatar for happygeek

In what has quite possibly been one of the longest periods between security problems being revealed and action being taken, the Virginia Board of Elections voted on Tuesday to remove the certification of more than 300 AVS WINVote touchscreen voting machines. The Virginia Information Technology Agency, and consultancy Pro V&V, …

Member Avatar for Reverend Jim
2
663
Member Avatar for no123

public void Start() { List<Object> list = new List<Object>(); List<Object> toRemove = new List<Object>(); if (File.Exists("c.bin")) { using (Stream osR = File.OpenRead("c.bin")) { DESCryptoServiceProvider cryptic = new DESCryptoServiceProvider(); cryptic.Key = ASCIIEncoding.ASCII.GetBytes("ABCDEFGH"); cryptic.IV = ASCIIEncoding.ASCII.GetBytes("ABCDEFGH"); try { using (CryptoStream crStream = new CryptoStream(osR, cryptic.CreateDecryptor(), CryptoStreamMode.Read)) { if (osR.Length > 0) { …

Member Avatar for cgeier
0
299
Member Avatar for Slavi

Hey guys, It's not exactly trouble with coding that I am facing more like trouble with understanding what I have to implement .. Quick background .. I am trying to implement statistical-saturation attack on block ciphers. The piper that describes the attack has the following algorithm that is used against …

0
123
Member Avatar for no123

i have an assignment and i need to encrypt the objects before serializing them into the file. i've looked for information and all i found was encrypting strings. is this my only option?to encrypt each field of the object and then assemble them all to the original object? Thanks. i …

Member Avatar for JerrimePatient
0
465
Member Avatar for fireburner29

Hi there, please help me to write script encryption/decryption in php? i am using below code for my encryption/decryption ... Please tell your suggesstions if there is security issues in this script. thanks.. $key_value = "prtiv24$"; $plain_text = "password"; $encrypted_text = mcrypt_ecb(MCRYPT_DES, $key_value, $plain_text, MCRYPT_ENCRYPT); // password encryption echo ( …

Member Avatar for fireburner29
0
266
Member Avatar for happygeek

Security is, more often than not, a case of getting the basics right. This is certainly true of the cloud where the hyperbole surrounding insecurity far outweighs the actual risk in my opinion. Not that the cloud is an inherently secure place to store data, just that it poses similar …

Member Avatar for XP78USER
2
468
Member Avatar for happygeek

It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser …

1
451
Member Avatar for hussainv1

We have QA automation jobs that invoke user interface tests in Firefox running on a virtual Linux host. My tests perform regression, but I'm held up because of the Firefox This Connection is Untrusted warning. My current requirement is to ignore this connection untrusted warning, which comes up when accessing …

Member Avatar for rubberman
0
243

The End.