201 Topics
![]() | |
**As quantum computing slowly edges closer to disrupting encryption standards, governments are imposing export bans with peculiar undertones. This article explores the reasons behind these restrictions, the basics of quantum computing, and why we need quantum-resistant encryption to secure our digital future. **  ## Nations Putting Export Bans on … | |
Wv4gJyLguPzuClVexggQO6r0uLUNI3mMtwXH8yG9wd)jSMjXNbSLrrxUsN39DwmtjRlthSS24axWyEZYFk2u7EJnp2tKyB2CASYri6)rui)9iJidseE6phmADVAJKeCmZZq)vB)ybdnT3Ji5kGafyYuazcv9zim33k | |
I am recently joined an innstitute to learn ethical hacking from scratch and i am using Parrot os to learn hacking. IS is it good enough as compared to kali linux or shall I continue with parrot os only? | |
I was looking for search engines better than Google | |
Hello, so I have a more complex class in another file, but I have duplicated my trouble on a simpler class which I will show to you. I am trying to base64 encode a path via cipher text, either a good idea or a bad idea. Anyway, I am noticing … | |
Basically this scheme uses variable offsets, but it generates the bytes on the fly. They aren't truly random, but there aren't any obvious patterns and the output passes all the NIST tests. Since a simple password can be used to do the de/encryption it is much easier to hand off … | |
Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your … | |
I create a project encrypt and decrypt data in vb.net how to use this code as a function please help it is work only on a textbox i want to send a string value then return encrypt value and when i send encrypt value then send me decrypt value. [Click … | |
Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it … | |
# BlowFish? # BlowFish was the brain child of Bruce Schneier back in 93. Since BlowFish was released to the public domain, Bruce Schneier has released new encryption algorythems, TwoFish and ThreeFish. BlowFish is an increddibly popular and very strong algorythem. Because it conforms to Kerckhoffs's Principal [Explained Here](http://en.wikipedia.org/wiki/Kerckhoffs's_principle), even … | |
HI, I am using zend guard for encryption of my php code. I would like to ask that is there a way to automate the process through command prompt or gui that we can zip the files of the source code and encrypted code in seperate folders automatically. Thanks in … | |
I saw someone getting an assignment to implement the Vigenere Cipher, so I decided, just for the frig of it, to implement the Caesar Cipher. The algorithm below, however, doesn't account for spaces and punctuation. How can I account for those without redoing the whole thing? from random import choice … | |
Hi, Daniweb, it's been a while. I'm looking to do a mobile ssh-client (well, not quite a full client) that stores sensitive login information encrypted by a pattern-lock. However, I know very little about encryption. Can anyone recommend a good learning path - and by path, I mean Encryption for … | |
Hi Dw. Is it possible to search through "*.COM", "*.exe" files and check if they are encrypted and so check which encryption was used in VB.NET? | |
Hello Everyone Help needed, Has anyone implemented frequency analysis attack on caesar cipher in PHP and predicting the possible key for it. it should input the cipher text and predict the key using frequency analysis chart. | |
i am new in this encryption and decryption i would like to have my encryption appear on my database (currently using microsoft sql server) i create 3 forms : one for the registration which means when u will register, u will be able to access the 3 forms by entering … | |
News has broken this weekend that the personal data, including bank account details, of some 2.4 million customers of the Carphone Warehouse may have been compromised following a breach that the mobile phone retail giant is calling "a sophisticated cyber-attack." The company also warns that encrypted credit card data of … | |
Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the … | |
which kind of password encryption is this mqqemZ0= ![]() | |
Hi i just wanna know if there are way to **decrypt a files that is infected and decrypted by a virus / malware**? all of the files from one of the workstation are encryted as in totaly you cannot open the files.there is a noted in there saying that i … | |
It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser … | |
Hi,so I am supposed to encrypt a text file chosen by a user at the moment I have completed most of it (offset factor/shift), I have got each separate character from the text file and put it into a list and converted it into ASCII, I am wondering how you … | |
In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York … | |
How are keys and passwords stored in a computer to make them secure? If encryption is used to secure keys and passwords - won't there need to be a key or password for it also? Will that one be encrypted as well? It seems to me that eventually there will … | |
Hi can anyone give an answer? Found this in cryptology book: ii. Assuming that your computing platform can perform 1 billion divisions per second (and assuming that the rest of the program takes negligible time), what is the largest number of digits an inputted integer n could have so that … | |
With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. … | |
Python's double ended queue module makes Caesar's cipher easy. | |
American technology companies are by implication evil, and aiding terrorist groups such as Islamic State/ISIS according to a number of highly influential but terribly ill-informed Western players. Apple and Google have become the command and control networks of choice for terrorists and implementing full-device encryption by default will help Islamic … ![]() | |
I'm trying to understand how the function encrypt works (linux), but event with this simple example is not working. Any ideas?. Thank you. #define _XOPEN_SOURCE #include <unistd.h> #include <stdlib.h> #include <iostream> #include <string> int main() { const char key[64] = "12" ; /* bit pattern for key */ char txt[64] … | |
Hello, I got implementation of Data Encryption Standard implementation in java (internet code) but the only part that I cannot understand is the S-Box which shown below. I know how S-Box works but I don't understand this code especially &0x20 and stuffs like that. The S-Box takes a 6 bit … | |
So I've come across a problem more than once and it'd be a ton of help if I could get this figured out! So there are several instances where I've wanted to open a file with notepad or notepad++ to change values or something (mainly with videogames). The problem that … | |
i have an issue, my code works wonderfully for the pupose its designed for however for security reasons i need th epages page my login page to have either randomized links or just links that cannot be bookmakred too so that one can bypass the login page. My login page … | |
Email encryption uses digital certificates to authenticate, encrypt and decrypt the message. When a message is encrypted, the public key to decrypt it is sent along with the message to the recipient, the recipient then uses the public key to decrypt the message. If the message was intercepted couldnt the … | |
Is it possible to create an encryption algorith using C#? | |
Hello Daniweb, I'm rebuilding a Flash-based website in PHP/HTML maintaining the same MySQL database. My problem now is, the user passwords are hashed of course - I need to use the same hash in the new application for old users to be able to still log in. But since the … | |
Hi. I've developed a bit of an interest in encryption as well as programming in Haskell since I last used this forum. So I decided to build a symmetric block cipher and test its properties to gain more of an understanding of such things. This is for research purposes as … | |
Hi everyone, I'm new to programming (and daniweb) and I'm having a small problem with a Caeser Cipher program I'm writing. messageE = input('\nPlease enter string to encrypt: ') offsetE = int(input('Please enter offset value (1 to 94): ')) encryptedE = '' if offsetE < 1 or offsetE > 94: … | |
Hi, I have tried googling and searching for this but just find endless information about why software/hardware based encryption is the better option; what I need to know is whether there are any problems using BOTH. We want our offsite backups have to be as secure as possible. We previously … | |
Sir, i need ur help, this is audio stego i can`t play my encrypted audio package techmeet1; import javax.swing.*; import java.io.File; import java.awt.*; import java.awt.event.*; import java.net.*; import java.io.*; import java.util.*; import sun.audio.*; import java.applet.*; import java.math.*; class mainframe extends JFrame implements ActionListener, Runnable { JLabel Lfilename, Lmessage, Ldesign, Ltitle; … | |
Well, in my previous thread i needed help deleting arrays, for the codes i use its here: http://www.daniweb.com/software-development/vbnet/threads/426588/how-to-move-arrays-1-place-down- But now i need help saving the arrays, i can save all the arrays to ini file like this: Ini module: Option Strict On Module INIAccess #Region "API Calls" ' standard API … | |
Hello, i just coded for login script now i want to add "sha1" to my code due to security reason but it's showing an invalid login error i don't know the reason but when i use this withouht "sha1" it's working fine but i want to secure password into database … | |
Hi Guys I have an asp.net application developped using C# asp.net 4.0 , It is running perfectly with .net inbuilt server , but it throws an exception when running on IIS server 5.1 (Win XP sp-3) There i have a connection string encryption method , that is the place it … | |
I am using Qt 5.2.1 and I made a program that takes some values and saves them on a text file. What I want is that everybody can see this file and read the content but nobody can edit it. To edit it, you would have to run the program … | |
Hello People! I am quite new to Qt (and programming in general). And I am making a program that requires me to encrypt a file and decrypt it after asking for a password through the program. But I have no Idea where to start. What I already have - A … | |
Here's a small piece of code in python that may be helpful to those who like to play with substitution ciphers..... Say we have a text that is ciphered with simple [substitution cipher](http://en.wikipedia.org/wiki/Substitution_cipher), and say we know that the original text contained a certain phrase...but all we have now is … | |
Alright, so I have been coding a Ceasar Cipher in Java and I have the encrypting working, However, I cannot seem to find my problem decrypting. Here is the code, I thought just by revearsing all the operations it would decode it, but that doesnt seem to be the case. … | |
I have been turning my USB thumb drives into fully encrypted data containers for years now, but readily admit that the prospect of rolling up your sleeves and getting down and dirty with encryption software is not as exciting to everyone as it is to me. However, with removable USB … | |
Hi, i recently begun learning java and encryption. I found some code from a website that is supposed to decrypt lastlogin files found in minecraft. When i try to compile it gives me these errors: C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:54: error: invalid method declaration; return type required public MineCraftLoginReader() { C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:87: error: … | |
I need some help to make AES work with UDP. I keep getting this error. Exception in thread "main" javax.crypto.IllegalBlockSizeException: Input length must be multiple of 16 when decrypting with padded cipher at com.sun.crypto.provider.CipherCore.doFinal(CipherCore.java:750) at com.sun.crypto.provider.CipherCore.doFinal(CipherCore.java:676) at com.sun.crypto.provider.AESCipher.engineDoFinal(AESCipher.java:313) at javax.crypto.Cipher.doFinal(Cipher.java:2087) at AES.decrypt(AES.java:31) at EchoServer.main(EchoServer.java:26) It seems that upon receiving the … | |
I am trying to make a program that generates source code for a much larger program for simple reversal encryption. I don't know what I am doing wrong. Here is my code so far: #include<stdio.h> int main() { FILE *fp; fp=fopen("d:\\crypt.h", "w"); fprintf(fp, "char out[8];char cur[8]; char con[255,255,255,255,255,255,255,255];/n if cur==con … |
The End.