1,159 Topics

Member Avatar for
Member Avatar for Elliot_1

For my computing GCSE course i had to create a keyword cipher and most of my class did it in VB console, so so did it. Little did I know, it was the most difficult project i have had to code. I can't figure out what is wrong with the …

Member Avatar for Elliot_1
0
205
Member Avatar for joshuawilson11

hi, soat the moment i am writing an encryption program, i am not quite sure how to use for loops for lists, my list at the moment is this: **Somewhere in la Mancha, in a place whose name I do not care to remember, a gentleman lived not long ago, …

Member Avatar for joshuawilson11
0
198
Member Avatar for joshuawilson11

Hi,so I am supposed to encrypt a text file chosen by a user at the moment I have completed most of it (offset factor/shift), I have got each separate character from the text file and put it into a list and converted it into ASCII, I am wondering how you …

Member Avatar for joshuawilson11
0
510
Member Avatar for Nic_1

Is it possible to figure out a encryption / decryption key if you have only 6 datapoints (inputs / outputs)? Device ID (input) / (key) Device ID Lease Code 1 2 3 4 5 6 7 8 MI110800017 703 95be 73cb 416f 3155 14a8 e976 5750 703 MI110500013 8b97 1d6f …

Member Avatar for Schol-R-LEA
0
159
Member Avatar for happygeek

In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York …

Member Avatar for Tcll
3
939
Member Avatar for CodeWarrior14

Hello. I am was doing research on cryptography and found a simple algorithm (One time pad algorithm) that interests me. I was able to create a simple version of this that only works with capital letters. The problem however is that the encrypted contents doesn't only contain capital letters. It …

Member Avatar for vegaseat
0
374
Member Avatar for mattyd

Hello. I am beginning the process of implementing password encryption for User's on my future site (The site is not live or available yet). I have been reading up on hashing passwords and storing them in the database. **My question are as follows**: * I believe it has said that …

Member Avatar for iamthwee
0
396
Member Avatar for TObannion

Here is my encryption program. The decryption program is what is giving me some trouble. Here is the description of the first part: # encrypt.py - ENCODE MESSAGE AND WRITE TO FILE # # initialize a cipher list to store the numeric value of each character # input a string …

Member Avatar for TObannion
0
377
Member Avatar for Sphinx'LostNose

How are keys and passwords stored in a computer to make them secure? If encryption is used to secure keys and passwords - won't there need to be a key or password for it also? Will that one be encrypted as well? It seems to me that eventually there will …

Member Avatar for mike_2000_17
0
282
Member Avatar for riyamanavalan@g

any one please help me to do encryption and decryption using a secretkey in c#.

Member Avatar for Majida_Omari
0
176
Member Avatar for PulsarScript

Hi can anyone give an answer? Found this in cryptology book: ii. Assuming that your computing platform can perform 1 billion divisions per second (and assuming that the rest of the program takes negligible time), what is the largest number of digits an inputted integer n could have so that …

Member Avatar for Smalls
0
125
Member Avatar for ali11

everything is working fine except Encryption button. import java.awt.event.ActionEvent; import java.awt.event.ActionListener; import javax.swing.JButton; import javax.swing.JFrame; import javax.swing.JLabel; import javax.swing.JOptionPane; import javax.swing.JPanel; import javax.swing.JTextField; public class encryption extends JPanel implements ActionListener { char [] str= {'a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','u','v','w','x','y','z' }; char [] str1={'1','2','3','4','5','6','7','8','9','0','!','@','#','$','%','^','&','*','(','_','_','+','=',',','.','?'}; char [] a= new char [50]; char [] b= new char …

Member Avatar for JamesCherrill
0
279
Member Avatar for ernesto22

i have a problem with generating a one time password that will expire once used or after a few miute. this is what i want to do page 1. create a captcha. if verification is valid then direct me to page2 page 2. this page asks for my name or …

Member Avatar for ernesto22
0
227
Member Avatar for vegaseat

With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. …

Member Avatar for Lardmeister
3
1K
Member Avatar for Littlen

Hi all, Im trying to create an AES Shared secret to encrypt and decrypt a message in J2ME. Ive already tried this code in J2SS and it works fine but when i try to use the exact same code in J2ME it doesnt work. I get the following error : …

Member Avatar for avinashsdz
0
308
Member Avatar for vegaseat
Member Avatar for happygeek

According to the [Daily Mirror](http://www.mirror.co.uk/news/technology-science/technology/charlie-hebdo-isis-flag-death-4946579), a number of official websites connected to French municipalities were hacked at the end of last week to coincide with the Charlie Hebdo massacre and the hostage taking at the Jewish supermarket. The newspaper reported that the home screens of websites belonging to the towns …

Member Avatar for Warrens80
1
552
Member Avatar for CodeWarrior14

I'm working on a server and client program. Data will be exchanged between the server and client. This data will be encrypted. The server will always generate the salt and the IV. The client will receive the salt and IV and use it to encrypt / decrypt the data that …

Member Avatar for CodeWarrior14
0
3K
Member Avatar for CodeWarrior14

I improved my AES encryption code, I now generate a key from a password of any length. But now I dont know if I'm generating a 128, 192 or 256 bit AES key. Here is my code: import javax.crypto.spec.PBEKeySpec; import javax.crypto.spec.PBEParameterSpec; import javax.crypto.SecretKey; import javax.crypto.SecretKeyFactory; import javax.crypto.Cipher; public class AESCipher …

Member Avatar for CodeWarrior14
0
3K
Member Avatar for CodeWarrior14

Hello. I'm working on a project that requires some data to be encrypted with AES 128. My encryption works fine but when I decrypt I get an `Exception in thread "main" javax.crypto.IllegalBlockSizeException: Input length not multiple of 16 bytes` exception. Code: import javax.crypto.Cipher; import javax.crypto.spec.SecretKeySpec; public class AESCipher { private …

Member Avatar for JamesCherrill
0
881
Member Avatar for CodeWarrior14

I'm writing some custom encryption code in Java for my server. The only problem is that in my encryption I'm using XOR. The data gets encrypted fine, but when I decrypt it doesn't decrypt correctly. I am not sure what is cuasing this problem. Here is my code that I …

Member Avatar for Taywin
0
2K
Member Avatar for RobertHDD

Whoa Whoa before i say anything or now is I just Reinstalled Windows 8.1 on my PC connected to wifi everythings fine legitimate software all installed everything fine until my screen started switching between desktop and black screen until my antivirus program finally detected something called Crypto and there were …

Member Avatar for RobertHDD
0
191
Member Avatar for MasterHacker110

I'm trying to create a very simple enigma machine cipher. But mine doesn't decrypt the data correcly. #include <iostream> #include <string> using namespace std; const char alphabet[27] = { "ABCDEFGHIJKLMNOPQRSTUVWXYZ" }; const char reflector[27] = { "WSXRFVYHNIKPQAZEDCTGBUJMOL" }; const char rotors[27] = { "QWERTYUIOPASDFGHJKLZXCVBNM" }; /* Get the position of …

Member Avatar for tinstaafl
0
305
Member Avatar for MasterHacker110

I am working on a little project of mine. Nothing major, just messing around with encryption etc... I have problem thoug. My methods do not change the values of my data. Meaning that the pointer that I pass to hold my encrypted data, doesn't get the data assigned to its …

Member Avatar for MasterHacker110
0
179
Member Avatar for Coloradojaguar

It is a possibility that in the near future that sites which use encryption could get a search engine rank boost. Do you think that this potential change is a way to encourage more use of SSL/TLS encryption on web pages?

Member Avatar for Kelly Burby
0
289
Member Avatar for Jophis

I'm working on a simple Ceasar Cipher encryption program in C. I am trying to make it simpler for my son and I to decipher so I put these rules: characters other than letters are unchanged while lowercase and uppercase will remain in their current case (so a Y incremented …

Member Avatar for loserspearl
0
175
Member Avatar for happygeek

American technology companies are by implication evil, and aiding terrorist groups such as Islamic State/ISIS according to a number of highly influential but terribly ill-informed Western players. Apple and Google have become the command and control networks of choice for terrorists and implementing full-device encryption by default will help Islamic …

Member Avatar for Warrens80
4
974
Member Avatar for lena1990

hi all, i want to create an application that transmit voice in a sequre way i have read a lot of information about this subject but i have no idea to start with thanxs in advance for any help

Member Avatar for lena1990
0
127
Member Avatar for Sophia_1

Hi everyone,i have this mail notification whereby the receiver is selected from combobox. Upon combobox selection, the sender will click the submit button and the mail suppose to be sent to the receiver. But it seems that the combobox selection cannot be read.There is error message ie "Message could not …

Member Avatar for Sophia_1
0
213
Member Avatar for FireNet

File I/O With C++ Fstream **Intro** File handling is as simple as writing in a book, much easier to modify and find. It's so simple people get confused with it :-). Welcome to the world of file handling. We will use the c++ fstream classes to do our file handling. …

Member Avatar for Swalih
5
12K
Member Avatar for jBat

I'm trying to understand how the function encrypt works (linux), but event with this simple example is not working. Any ideas?. Thank you. #define _XOPEN_SOURCE #include <unistd.h> #include <stdlib.h> #include <iostream> #include <string> int main() { const char key[64] = "12" ; /* bit pattern for key */ char txt[64] …

Member Avatar for tinstaafl
0
158
Member Avatar for muskovitz

hey guys... i'd just want to test my router security for other weird reasons, so my airmon-ng acting weird whenever i type. airmon-ng start eth1 Interface Chipset Driver eth1 Broadcom wl - [phy0]mon0: ERROR while getting interface flags: No such device (monitor mode enabled on mon0) this problem start after …

0
170
Member Avatar for zachattack05

I'm sorry if this is the wrong place to put this, but since I normally code in C#, and my potential solution would involve using C# I figured this would be the best place to start. I've been given a task at work to allow our customers the ability to …

Member Avatar for RichardGalaviz
1
454
Member Avatar for DawnofanewEra

Hello, I got implementation of Data Encryption Standard implementation in java (internet code) but the only part that I cannot understand is the S-Box which shown below. I know how S-Box works but I don't understand this code especially &0x20 and stuffs like that. The S-Box takes a 6 bit …

Member Avatar for rubberman
0
2K
Member Avatar for Hopp3r

So I've come across a problem more than once and it'd be a ton of help if I could get this figured out! So there are several instances where I've wanted to open a file with notepad or notepad++ to change values or something (mainly with videogames). The problem that …

Member Avatar for gerbil
0
492
Member Avatar for diliupgabadamudalige

Is there any way to encrypt/decrypt all image files and audio files with python storing them in a password protected file and then retrieving them again without slowing donw the decryption part?

Member Avatar for diliupgabadamudalige
0
208
Member Avatar for berserk

i have an issue, my code works wonderfully for the pupose its designed for however for security reasons i need th epages page my login page to have either randomized links or just links that cannot be bookmakred too so that one can bypass the login page. My login page …

Member Avatar for berserk
0
468
Member Avatar for Ghost0s

Someone explain(detailed) how the E2EE works please i googled for it but i didnt find something intresting or rich of informations :p

Member Avatar for Ghost0s
0
210
Member Avatar for iConqueror

Email encryption uses digital certificates to authenticate, encrypt and decrypt the message. When a message is encrypted, the public key to decrypt it is sent along with the message to the recipient, the recipient then uses the public key to decrypt the message. If the message was intercepted couldnt the …

Member Avatar for Hiroshe
0
261
Member Avatar for iConqueror
Member Avatar for Kev756

Type rounds_key 'Storage Container raundnyh keys key (255) As Byte End Type Global data_ () As Byte 'Declare global byte array Global key_ () As Byte 'Declare global byte array Global data_size_block As Long 'Declare global variable 4 bytes Global su_box () As Byte 'Declare global byte array Global …

Member Avatar for Stuugie
0
245
Member Avatar for sundeep.gurroby

Hi guys, always a big thanks for your input. Really appreciate as always. Ok my issue today is with the password_hash function which randomly generate a salt before encryption. I am creating a user registration form...i need to protect the password before it is saved to the database when user …

Member Avatar for diafol
0
294
Member Avatar for Excizted

Hello, I hope someone is more knowledgeable in Java than me while still knowing PHP! The following Java code makes a hash from a string, and I need a PHP equivalent that makes the exact same hashes. Simply md5() does not do the trick, and I looked at some PHP …

Member Avatar for Excizted
0
1K
Member Avatar for Excizted

Hello Daniweb, I'm rebuilding a Flash-based website in PHP/HTML maintaining the same MySQL database. My problem now is, the user passwords are hashed of course - I need to use the same hash in the new application for old users to be able to still log in. But since the …

Member Avatar for Excizted
0
234
Member Avatar for Mushy-pea

Hi. I've developed a bit of an interest in encryption as well as programming in Haskell since I last used this forum. So I decided to build a symmetric block cipher and test its properties to gain more of an understanding of such things. This is for research purposes as …

Member Avatar for Mushy-pea
1
304
Member Avatar for Reverend Jim

A [security audit](https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf) of the free and Open Source encryption utility, TrueCrypt >"found no evidence of backdoors or otherwise intentionally malicious code in the assessed areas," and that the found vulnerabilities "all appear to be unintentional, introduced as the result of bugs rather than malice." A summary of the results …

Member Avatar for Hiroshe
2
277
Member Avatar for anar.bataa

Hi guys i have this code for multicast with encryption and decryption with DES(shared key) i think encryption goes ok but decryption not working and i can't find the problem both codes compiles fine without problem when i execute them encryption works but decryption not PLS HELP ME!!!... here is …

0
160
Member Avatar for MasterHacker110

I need to copy modified data that is stored in an char* to another char* but I get an access violation error. Here is the code int EncryptData(char *data_source, char *data_cipher, size_t sizeofdata) { char *tmp_data; long long int digit; tmp_data = new char[sizeofdata]; /* Do some calculations here with …

Member Avatar for MasterHacker110
0
6K
Member Avatar for Matthew34

Hi, Anyone can explain what is ion cube loader? and how it works for encryption and decryption? Thanks in advance..

Member Avatar for diafol
0
353
Member Avatar for neutralfox

Hello everyone, I got a small question on encryption, actually I am trying to learn the various techniques to encrypt a message. Now I am trying AES, using the built in security package in Java. The problem is that I am having a problem with this encryption algorithm. Actually I've …

Member Avatar for JamesCherrill
0
1K

The End.