202 Topics
| |
hey i am trying to implement the diffie hellman key exchange algorithm in matlab. my problem is this: the program works just fine for numbers upto 5 digits, but after that it just sort of stops working. thing is i need to deal (multiply,exponentiation,modular arith etc.) with really big numbers … | |
Hello I'm not too experience with c++ but I've learned some of the basics. I tried making a small txt file encryption program however my output prints one too many times to the 2nd txt file. This occurs both when encrypting and decrypting. [CODE] #include <iostream> #include <fstream> #include <cstdlib> … | |
We may set one password for a file if we don't want others to open it, especially the secrete document. Generally speaking, we are used to writing articles or papers in Microsoft Word. And we may need to encrypt Word document if it is very important for security. Also, when … | |
I want to create a program that create a file and encrypt it and when the user click the file it will open the program and ask user for password and if the password is correct it will decrypt the file but not save the decrypt file and read the … | |
Hi all, I'm writing a simple encryption algorithm and have stumbled upon a problem relating to the file handling itself. What my program does is reads text from a file, encrypts it, and writes it to another file. That's all well and good, and it works fine - until a … | |
Hi, I want to know if we can use javascript for file encryption (not text). If yes then how? Any help appreciated. | |
Hello guys, this is my first post, so don't be harsh if I do something stupid. Well, the reason why I'm posting here is because I need to find a method to alter the stream itself, not just the buffer I send to a variable with "file.Read(". For example, lets … | |
Hi all, I'm currently working on a RC4 project for my computer security class. I have looked at the [URL="http://en.wikipedia.org/wiki/RC4"]wikipedia page[/URL] for RC4, and I'm trying to adapt that algorithm to my problem. I can get the correct encrypted text when I just cout the values. However, when I try … | |
So, first off lemme explain what a substitution code is in case you don't know. In cryptography, it's a system by which one letter is replaced with another predetermined letter. For example, if "I" turns to "E", and "F" turns to "V", the word "If" would be written as "Ev". … | |
This is my Cogwheel Encryption Method to encrypt and decrypt strings. Wheel1 is Replace by Wheel2 when Encrypting and Wheel2 is Replace by wheel1 when you are decrypting... To Encrypt a string, just call the EncryptString function [CODE=vb] Text2.Text = EncryptString(Text1.Text) [/CODE] To Decrypt a string, just call the DecryptString … | |
Hello. I am currently working on a little password based file encryption feature for an application I am doing. The following is an incomplete function that I have worked on to encrypt some content and (will eventually) write it to a file. [CODE]public static void encrypt(byte [] data, char [] … | |
The program initially asks the user to insert the secret sentence and the encryption code (an integer number in the range 1-100). Then, the program calls a user-defined function void encrypter (char *, int) that accepts the string pointer and the encryption code. The encryption algorithm is based on the … | |
Hello! I have i problem i was hoping you could help me with, I have to write a script that will ask the user for a username and password, and validate it through /etc/passwd and /etc/shadow. I've looked all over the place for an answer to this and i just … | |
Hi, I'm attempting to generate a new cipher key using a string that was negotiated earlier on. On running the code I get the error: Exception in thread "main" java.lang.IllegalArgumentException: Missing argument at javax.crypto.spec.SecretKeySpec.<init>(DashoA13*..) at shared.Cryptographer.makeCipher(Cryptographer.java:254) at client.Main.main(Main.java:60) Java Result: 1 the code is as follow: [CODE] public void makeCipher(String … | |
Hey guys, my name is Ross. Im new to programming and i need some help with assembler. I have a menu with a number of options that the user can do. 1. The first one is the user must input a string of characters up to the limit of 25 … | |
Back in 1976, along with Stanford University professor Martin Hellman, Whit Diffie produced quite possibly the most important paper in the history of cryptography. That paper, New Directions in Cryptography, laid the groundwork for solving one of the fundamental problems of cryptography, that of key distribution. Now Diffie himself is … | |
I installed flycryptor software on my system to lock certain files and folders. Now the problem is that those files are encrypted and my friend have uninstalled the software .Those files appear somewhat scary to look at and are not opening properly. So is there any way by which i … | |
I have visited this forum many times in the past and I decided to actually join. My first question - where is the encryption algorithm actually implemented in bluethooth? more specifically bluez. I have been sifting through the bluez code trying to find this, and so far I have only … | |
I have found a module pycrypto which has an AES encryption and decryption function, in commandline everything works fine both encryption and decryption, but if I want to implement it in my program, it fails =( [code=python]def aes(txt): global crypt message="".join(txt) #format the message which has to be encrypted/decrypted to … | |
the rc6 paper say this [CODE]Key schedule for RC6-w/r/b Input: User-supplied b byte key preloaded into the c-word array L[0; ..., c - 1] Number r of rounds Output: w-bit round keys S[0; ..., 2r + 3] Procedure: S[0] = Pw for i = 1 to 2r + 3 do … | |
can anyone tell me what i did wrong with the decryption part of this code? ive been looking at it for some time now (while working on other related stuff), and i cant seem to find the problem with it. its getting really retarded, on my part [B]and this is … | |
Hi Guys, I'm really interested in C++ and am currently making a basic Text based poker game. on a sideline to this does anyone know any simple encryption code or where to start when doing this? For instance taking a text file (.txt or even .doc?) and creating your own … | |
Call the National Guard. On second thoughts, call someone else. After all, it is the National Guard which has somehow managed to lose an archival data disk containing five years worth of staff records covering some 15,000 personnel. The US National Guard is now recommending that any current and former … | |
I have created a encryptor/decryptor that allows you to encrypt/decrypt text in a textbox, or a file. The basis of the system is to allow a user to thoroughly protect data within their system. Is there anyone that would be willing to test the program? | |
Okay so lately I have been messing around with encryption. I thought I might give making my own simple encryption program a shot. So I am trying to make it. I am compiling my code in DEV C++ and when it runs, after I enter the message, nothing happens. It … | |
Hello! I've started programming C++ a week ago, so I cannot solve my problems easily. I've started a small project for learning classes, it's about encryption and stuff. I don't really get pointers, although I've read some about them. My problem is that when I use the cipher, it replaces … | |
I want to perform URL ENCRYPTION for my website......Can anyone help me. | |
Some might argue that it has been a bad year for encryption. After all, just as the last decade was ending came reports that the algorithm that is used to encrypt GSM mobile phone calls (as used by some 4 billion people around the world) had been cracked wide open. … | |
| |
According to a new survey of London taxi drivers, an average of 10,000 mobile phones are left behind by customers every single month. If that total is not staggeringly high enough, you can top it up with another 1000 iPods and memory sticks if you like. December is the worse … |
The End.