1,159 Topics
![]() | |
For my computing GCSE course i had to create a keyword cipher and most of my class did it in VB console, so so did it. Little did I know, it was the most difficult project i have had to code. I can't figure out what is wrong with the … | |
hi, soat the moment i am writing an encryption program, i am not quite sure how to use for loops for lists, my list at the moment is this: **Somewhere in la Mancha, in a place whose name I do not care to remember, a gentleman lived not long ago, … | |
Hi,so I am supposed to encrypt a text file chosen by a user at the moment I have completed most of it (offset factor/shift), I have got each separate character from the text file and put it into a list and converted it into ASCII, I am wondering how you … | |
Is it possible to figure out a encryption / decryption key if you have only 6 datapoints (inputs / outputs)? Device ID (input) / (key) Device ID Lease Code 1 2 3 4 5 6 7 8 MI110800017 703 95be 73cb 416f 3155 14a8 e976 5750 703 MI110500013 8b97 1d6f … | |
In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York … | |
Hello. I am was doing research on cryptography and found a simple algorithm (One time pad algorithm) that interests me. I was able to create a simple version of this that only works with capital letters. The problem however is that the encrypted contents doesn't only contain capital letters. It … | |
Hello. I am beginning the process of implementing password encryption for User's on my future site (The site is not live or available yet). I have been reading up on hashing passwords and storing them in the database. **My question are as follows**: * I believe it has said that … ![]() | |
Here is my encryption program. The decryption program is what is giving me some trouble. Here is the description of the first part: # encrypt.py - ENCODE MESSAGE AND WRITE TO FILE # # initialize a cipher list to store the numeric value of each character # input a string … | |
How are keys and passwords stored in a computer to make them secure? If encryption is used to secure keys and passwords - won't there need to be a key or password for it also? Will that one be encrypted as well? It seems to me that eventually there will … | |
any one please help me to do encryption and decryption using a secretkey in c#. | |
Hi can anyone give an answer? Found this in cryptology book: ii. Assuming that your computing platform can perform 1 billion divisions per second (and assuming that the rest of the program takes negligible time), what is the largest number of digits an inputted integer n could have so that … | |
everything is working fine except Encryption button. import java.awt.event.ActionEvent; import java.awt.event.ActionListener; import javax.swing.JButton; import javax.swing.JFrame; import javax.swing.JLabel; import javax.swing.JOptionPane; import javax.swing.JPanel; import javax.swing.JTextField; public class encryption extends JPanel implements ActionListener { char [] str= {'a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','u','v','w','x','y','z' }; char [] str1={'1','2','3','4','5','6','7','8','9','0','!','@','#','$','%','^','&','*','(','_','_','+','=',',','.','?'}; char [] a= new char [50]; char [] b= new char … | |
i have a problem with generating a one time password that will expire once used or after a few miute. this is what i want to do page 1. create a captcha. if verification is valid then direct me to page2 page 2. this page asks for my name or … | |
With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. … | |
Hi all, Im trying to create an AES Shared secret to encrypt and decrypt a message in J2ME. Ive already tried this code in J2SS and it works fine but when i try to use the exact same code in J2ME it doesnt work. I get the following error : … | |
Python's double ended queue module makes Caesar's cipher easy. | |
According to the [Daily Mirror](http://www.mirror.co.uk/news/technology-science/technology/charlie-hebdo-isis-flag-death-4946579), a number of official websites connected to French municipalities were hacked at the end of last week to coincide with the Charlie Hebdo massacre and the hostage taking at the Jewish supermarket. The newspaper reported that the home screens of websites belonging to the towns … ![]() | |
I'm working on a server and client program. Data will be exchanged between the server and client. This data will be encrypted. The server will always generate the salt and the IV. The client will receive the salt and IV and use it to encrypt / decrypt the data that … | |
I improved my AES encryption code, I now generate a key from a password of any length. But now I dont know if I'm generating a 128, 192 or 256 bit AES key. Here is my code: import javax.crypto.spec.PBEKeySpec; import javax.crypto.spec.PBEParameterSpec; import javax.crypto.SecretKey; import javax.crypto.SecretKeyFactory; import javax.crypto.Cipher; public class AESCipher … | |
Hello. I'm working on a project that requires some data to be encrypted with AES 128. My encryption works fine but when I decrypt I get an `Exception in thread "main" javax.crypto.IllegalBlockSizeException: Input length not multiple of 16 bytes` exception. Code: import javax.crypto.Cipher; import javax.crypto.spec.SecretKeySpec; public class AESCipher { private … | |
I'm writing some custom encryption code in Java for my server. The only problem is that in my encryption I'm using XOR. The data gets encrypted fine, but when I decrypt it doesn't decrypt correctly. I am not sure what is cuasing this problem. Here is my code that I … | |
Whoa Whoa before i say anything or now is I just Reinstalled Windows 8.1 on my PC connected to wifi everythings fine legitimate software all installed everything fine until my screen started switching between desktop and black screen until my antivirus program finally detected something called Crypto and there were … | |
I'm trying to create a very simple enigma machine cipher. But mine doesn't decrypt the data correcly. #include <iostream> #include <string> using namespace std; const char alphabet[27] = { "ABCDEFGHIJKLMNOPQRSTUVWXYZ" }; const char reflector[27] = { "WSXRFVYHNIKPQAZEDCTGBUJMOL" }; const char rotors[27] = { "QWERTYUIOPASDFGHJKLZXCVBNM" }; /* Get the position of … | |
I am working on a little project of mine. Nothing major, just messing around with encryption etc... I have problem thoug. My methods do not change the values of my data. Meaning that the pointer that I pass to hold my encrypted data, doesn't get the data assigned to its … | |
It is a possibility that in the near future that sites which use encryption could get a search engine rank boost. Do you think that this potential change is a way to encourage more use of SSL/TLS encryption on web pages? | |
I'm working on a simple Ceasar Cipher encryption program in C. I am trying to make it simpler for my son and I to decipher so I put these rules: characters other than letters are unchanged while lowercase and uppercase will remain in their current case (so a Y incremented … ![]() | |
American technology companies are by implication evil, and aiding terrorist groups such as Islamic State/ISIS according to a number of highly influential but terribly ill-informed Western players. Apple and Google have become the command and control networks of choice for terrorists and implementing full-device encryption by default will help Islamic … ![]() | |
hi all, i want to create an application that transmit voice in a sequre way i have read a lot of information about this subject but i have no idea to start with thanxs in advance for any help | |
Hi everyone,i have this mail notification whereby the receiver is selected from combobox. Upon combobox selection, the sender will click the submit button and the mail suppose to be sent to the receiver. But it seems that the combobox selection cannot be read.There is error message ie "Message could not … | |
File I/O With C++ Fstream **Intro** File handling is as simple as writing in a book, much easier to modify and find. It's so simple people get confused with it :-). Welcome to the world of file handling. We will use the c++ fstream classes to do our file handling. … | |
I'm trying to understand how the function encrypt works (linux), but event with this simple example is not working. Any ideas?. Thank you. #define _XOPEN_SOURCE #include <unistd.h> #include <stdlib.h> #include <iostream> #include <string> int main() { const char key[64] = "12" ; /* bit pattern for key */ char txt[64] … | |
hey guys... i'd just want to test my router security for other weird reasons, so my airmon-ng acting weird whenever i type. airmon-ng start eth1 Interface Chipset Driver eth1 Broadcom wl - [phy0]mon0: ERROR while getting interface flags: No such device (monitor mode enabled on mon0) this problem start after … | |
I'm sorry if this is the wrong place to put this, but since I normally code in C#, and my potential solution would involve using C# I figured this would be the best place to start. I've been given a task at work to allow our customers the ability to … | |
Hello, I got implementation of Data Encryption Standard implementation in java (internet code) but the only part that I cannot understand is the S-Box which shown below. I know how S-Box works but I don't understand this code especially &0x20 and stuffs like that. The S-Box takes a 6 bit … | |
So I've come across a problem more than once and it'd be a ton of help if I could get this figured out! So there are several instances where I've wanted to open a file with notepad or notepad++ to change values or something (mainly with videogames). The problem that … | |
![]() | Is there any way to encrypt/decrypt all image files and audio files with python storing them in a password protected file and then retrieving them again without slowing donw the decryption part? ![]() |
i have an issue, my code works wonderfully for the pupose its designed for however for security reasons i need th epages page my login page to have either randomized links or just links that cannot be bookmakred too so that one can bypass the login page. My login page … | |
Someone explain(detailed) how the E2EE works please i googled for it but i didnt find something intresting or rich of informations :p | |
Email encryption uses digital certificates to authenticate, encrypt and decrypt the message. When a message is encrypted, the public key to decrypt it is sent along with the message to the recipient, the recipient then uses the public key to decrypt the message. If the message was intercepted couldnt the … | |
Is it possible to create an encryption algorith using C#? | |
Type rounds_key 'Storage Container raundnyh keys key (255) As Byte End Type Global data_ () As Byte 'Declare global byte array Global key_ () As Byte 'Declare global byte array Global data_size_block As Long 'Declare global variable 4 bytes Global su_box () As Byte 'Declare global byte array Global … | |
![]() | Hi guys, always a big thanks for your input. Really appreciate as always. Ok my issue today is with the password_hash function which randomly generate a salt before encryption. I am creating a user registration form...i need to protect the password before it is saved to the database when user … ![]() |
Hello, I hope someone is more knowledgeable in Java than me while still knowing PHP! The following Java code makes a hash from a string, and I need a PHP equivalent that makes the exact same hashes. Simply md5() does not do the trick, and I looked at some PHP … | |
Hello Daniweb, I'm rebuilding a Flash-based website in PHP/HTML maintaining the same MySQL database. My problem now is, the user passwords are hashed of course - I need to use the same hash in the new application for old users to be able to still log in. But since the … | |
Hi. I've developed a bit of an interest in encryption as well as programming in Haskell since I last used this forum. So I decided to build a symmetric block cipher and test its properties to gain more of an understanding of such things. This is for research purposes as … | |
A [security audit](https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf) of the free and Open Source encryption utility, TrueCrypt >"found no evidence of backdoors or otherwise intentionally malicious code in the assessed areas," and that the found vulnerabilities "all appear to be unintentional, introduced as the result of bugs rather than malice." A summary of the results … | |
Hi guys i have this code for multicast with encryption and decryption with DES(shared key) i think encryption goes ok but decryption not working and i can't find the problem both codes compiles fine without problem when i execute them encryption works but decryption not PLS HELP ME!!!... here is … | |
I need to copy modified data that is stored in an char* to another char* but I get an access violation error. Here is the code int EncryptData(char *data_source, char *data_cipher, size_t sizeofdata) { char *tmp_data; long long int digit; tmp_data = new char[sizeofdata]; /* Do some calculations here with … | |
Hi, Anyone can explain what is ion cube loader? and how it works for encryption and decryption? Thanks in advance.. ![]() | |
Hello everyone, I got a small question on encryption, actually I am trying to learn the various techniques to encrypt a message. Now I am trying AES, using the built in security package in Java. The problem is that I am having a problem with this encryption algorithm. Actually I've … |
The End.