202 Topics

Member Avatar for
Member Avatar for DawnofanewEra

Hello, I got implementation of Data Encryption Standard implementation in java (internet code) but the only part that I cannot understand is the S-Box which shown below. I know how S-Box works but I don't understand this code especially &0x20 and stuffs like that. The S-Box takes a 6 bit …

Member Avatar for rubberman
0
2K
Member Avatar for Hopp3r

So I've come across a problem more than once and it'd be a ton of help if I could get this figured out! So there are several instances where I've wanted to open a file with notepad or notepad++ to change values or something (mainly with videogames). The problem that …

Member Avatar for gerbil
0
489
Member Avatar for berserk

i have an issue, my code works wonderfully for the pupose its designed for however for security reasons i need th epages page my login page to have either randomized links or just links that cannot be bookmakred too so that one can bypass the login page. My login page …

Member Avatar for berserk
0
466
Member Avatar for iConqueror

Email encryption uses digital certificates to authenticate, encrypt and decrypt the message. When a message is encrypted, the public key to decrypt it is sent along with the message to the recipient, the recipient then uses the public key to decrypt the message. If the message was intercepted couldnt the …

Member Avatar for Hiroshe
0
260
Member Avatar for iConqueror
Member Avatar for Excizted

Hello Daniweb, I'm rebuilding a Flash-based website in PHP/HTML maintaining the same MySQL database. My problem now is, the user passwords are hashed of course - I need to use the same hash in the new application for old users to be able to still log in. But since the …

Member Avatar for Excizted
0
231
Member Avatar for Mushy-pea

Hi. I've developed a bit of an interest in encryption as well as programming in Haskell since I last used this forum. So I decided to build a symmetric block cipher and test its properties to gain more of an understanding of such things. This is for research purposes as …

Member Avatar for Mushy-pea
1
301
Member Avatar for danae.gordon9

Hi everyone, I'm new to programming (and daniweb) and I'm having a small problem with a Caeser Cipher program I'm writing. messageE = input('\nPlease enter string to encrypt: ') offsetE = int(input('Please enter offset value (1 to 94): ')) encryptedE = '' if offsetE < 1 or offsetE > 94: …

Member Avatar for vegaseat
0
259
Member Avatar for Geekitygeek

Hi, I have tried googling and searching for this but just find endless information about why software/hardware based encryption is the better option; what I need to know is whether there are any problems using BOTH. We want our offsite backups have to be as secure as possible. We previously …

Member Avatar for Geekitygeek
0
402
Member Avatar for santi.ayasamy

Sir, i need ur help, this is audio stego i can`t play my encrypted audio package techmeet1; import javax.swing.*; import java.io.File; import java.awt.*; import java.awt.event.*; import java.net.*; import java.io.*; import java.util.*; import sun.audio.*; import java.applet.*; import java.math.*; class mainframe extends JFrame implements ActionListener, Runnable { JLabel Lfilename, Lmessage, Ldesign, Ltitle; …

Member Avatar for JamesCherrill
-1
498
Member Avatar for iFrolox

Well, in my previous thread i needed help deleting arrays, for the codes i use its here: http://www.daniweb.com/software-development/vbnet/threads/426588/how-to-move-arrays-1-place-down- But now i need help saving the arrays, i can save all the arrays to ini file like this: Ini module: Option Strict On Module INIAccess #Region "API Calls" ' standard API …

Member Avatar for DreamForLives
0
453
Member Avatar for Anubhav_1

Hello, i just coded for login script now i want to add "sha1" to my code due to security reason but it's showing an invalid login error i don't know the reason but when i use this withouht "sha1" it's working fine but i want to secure password into database …

Member Avatar for Bob Hensley
0
226
Member Avatar for Sumith Asanka

Hi Guys I have an asp.net application developped using C# asp.net 4.0 , It is running perfectly with .net inbuilt server , but it throws an exception when running on IIS server 5.1 (Win XP sp-3) There i have a connection string encryption method , that is the place it …

0
187
Member Avatar for butterfingerss

I am using Qt 5.2.1 and I made a program that takes some values and saves them on a text file. What I want is that everybody can see this file and read the content but nobody can edit it. To edit it, you would have to run the program …

Member Avatar for panqnik
0
297
Member Avatar for butterfingerss

Hello People! I am quite new to Qt (and programming in general). And I am making a program that requires me to encrypt a file and decrypt it after asking for a password through the program. But I have no Idea where to start. What I already have - A …

Member Avatar for sarahwilliams25
0
1K
Member Avatar for vunkas

Here's a small piece of code in python that may be helpful to those who like to play with substitution ciphers..... Say we have a text that is ciphered with simple [substitution cipher](http://en.wikipedia.org/wiki/Substitution_cipher), and say we know that the original text contained a certain phrase...but all we have now is …

Member Avatar for nosrac25
2
437
Member Avatar for Doogledude123

Alright, so I have been coding a Ceasar Cipher in Java and I have the encrypting working, However, I cannot seem to find my problem decrypting. Here is the code, I thought just by revearsing all the operations it would decode it, but that doesnt seem to be the case. …

0
120
Member Avatar for happygeek

I have been turning my USB thumb drives into fully encrypted data containers for years now, but readily admit that the prospect of rolling up your sleeves and getting down and dirty with encryption software is not as exciting to everyone as it is to me. However, with removable USB …

0
601
Member Avatar for Arin_1

Hi, i recently begun learning java and encryption. I found some code from a website that is supposed to decrypt lastlogin files found in minecraft. When i try to compile it gives me these errors: C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:54: error: invalid method declaration; return type required public MineCraftLoginReader() { C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:87: error: …

Member Avatar for Ewald Horn
0
667
Member Avatar for cswong

I need some help to make AES work with UDP. I keep getting this error. Exception in thread "main" javax.crypto.IllegalBlockSizeException: Input length must be multiple of 16 when decrypting with padded cipher at com.sun.crypto.provider.CipherCore.doFinal(CipherCore.java:750) at com.sun.crypto.provider.CipherCore.doFinal(CipherCore.java:676) at com.sun.crypto.provider.AESCipher.engineDoFinal(AESCipher.java:313) at javax.crypto.Cipher.doFinal(Cipher.java:2087) at AES.decrypt(AES.java:31) at EchoServer.main(EchoServer.java:26) It seems that upon receiving the …

0
157
Member Avatar for gruntler

I am trying to make a program that generates source code for a much larger program for simple reversal encryption. I don't know what I am doing wrong. Here is my code so far: #include<stdio.h> int main() { FILE *fp; fp=fopen("d:\\crypt.h", "w"); fprintf(fp, "char out[8];char cur[8]; char con[255,255,255,255,255,255,255,255];/n if cur==con …

Member Avatar for gruntler
0
387
Member Avatar for Khoo

Can anyone explain why this error happen ? I try to decrypt password from database file. cursor.execute('SELECT action_url, username_value, password_value FROM logins') for result in cursor.fetchall(): password = win32crypt.CryptUnprotectData(result[2], None, None, None, 0)[1] if password: print 'Site: ' + result[0] print 'Username: ' + result[1] print 'Password: ' + password …

0
89
Member Avatar for CJMW

So as part of my computer science course, we have been instructed to build an encryption process. I have a good knowledge on different encryption methods (RSA for example), however I am having a hard time trying to create my own. Now, before anyone says it, I know, using homebrew …

Member Avatar for meta.quota
0
268
Member Avatar for sixtorodriguez

So, I have attached my code below. It worked fine , until I introduced the part to print out what's in the input file. After I did this, it says it's completed, but I doesn't copy the content in the output file. What should I change? Thanks a lot /*Program …

Member Avatar for sixtorodriguez
0
316
Member Avatar for minitauros

Just curious about your thoughts on this subject. **Example:** www.site.com/?id=1 or www.site.com/?id=8adyfa8df614812yasdf (which is also "1", but encrypted) What would you recommend? What do you use? Anyone with pros and/or cons on if you should encrypt your URL data? **My thoughts:** Pros (to encrypting URL data): - Makes it harder …

Member Avatar for pritaeas
1
216
Member Avatar for nacedo

I am using Formidalbe Pro on my wordpress site. Users are sending me a form that I make editable by them and by me (Its all managed by Formidable). They have to be logged-in with wordpress to fill the form and edit it. No anonymous access. I want to encrypt …

Member Avatar for diafol
0
271
Member Avatar for ultimate.angel107

how do i make a live kali usb with persistence and encrypt it so that no one besides me could access it..? any help would be appreciated thnx in advance :-)

Member Avatar for CimmerianX
0
163
Member Avatar for SpottyBlue

I am kind of new creating the A1Z26 cipher generator. But this has a problem. Only the program generates the last two numbers. What's wrong? #include <iostream> #include <ostream> #include <string> using namespace std; int i; // Counter char str1[101]; // A string of characters for generator. string str2, str3; …

Member Avatar for tinstaafl
0
2K
Member Avatar for sriramkarthick

What is the usage of "**preg_replace('/\\x13\\x00*$/', '', $plain_text);**" ?

Member Avatar for n21115
0
266
Member Avatar for farmwife

"Active cracking" means indirectly changing a plaintext message so that it becomes a totally different, plaintext message that says something totally different but still makes sense, by creating a brand new encryption key that is applied to the ciphertext itself and changes the ciphertext rather than the original plaintext. I …

0
138

The End.