202 Topics

Member Avatar for
Member Avatar for millionfires

hey i am trying to implement the diffie hellman key exchange algorithm in matlab. my problem is this: the program works just fine for numbers upto 5 digits, but after that it just sort of stops working. thing is i need to deal (multiply,exponentiation,modular arith etc.) with really big numbers …

0
93
Member Avatar for davi0011

Hello I'm not too experience with c++ but I've learned some of the basics. I tried making a small txt file encryption program however my output prints one too many times to the 2nd txt file. This occurs both when encrypting and decrypting. [CODE] #include <iostream> #include <fstream> #include <cstdlib> …

Member Avatar for jonsca
0
200
Member Avatar for delia99

We may set one password for a file if we don't want others to open it, especially the secrete document. Generally speaking, we are used to writing articles or papers in Microsoft Word. And we may need to encrypt Word document if it is very important for security. Also, when …

0
161
Member Avatar for mbhaluni2

I want to create a program that create a file and encrypt it and when the user click the file it will open the program and ask user for password and if the password is correct it will decrypt the file but not save the decrypt file and read the …

Member Avatar for Ancient Dragon
0
114
Member Avatar for SeanC

Hi all, I'm writing a simple encryption algorithm and have stumbled upon a problem relating to the file handling itself. What my program does is reads text from a file, encrypts it, and writes it to another file. That's all well and good, and it works fine - until a …

Member Avatar for SeanC
0
459
Member Avatar for ryoonnet

Hi, I want to know if we can use javascript for file encryption (not text). If yes then how? Any help appreciated.

Member Avatar for Taywin
0
106
Member Avatar for 0dark

Hello guys, this is my first post, so don't be harsh if I do something stupid. Well, the reason why I'm posting here is because I need to find a method to alter the stream itself, not just the buffer I send to a variable with "file.Read(". For example, lets …

Member Avatar for Ancient Dragon
0
228
Member Avatar for Kontained

Hi all, I'm currently working on a RC4 project for my computer security class. I have looked at the [URL="http://en.wikipedia.org/wiki/RC4"]wikipedia page[/URL] for RC4, and I'm trying to adapt that algorithm to my problem. I can get the correct encrypted text when I just cout the values. However, when I try …

Member Avatar for Kontained
0
3K
Member Avatar for OneRunner

So, first off lemme explain what a substitution code is in case you don't know. In cryptography, it's a system by which one letter is replaced with another predetermined letter. For example, if "I" turns to "E", and "F" turns to "V", the word "If" would be written as "Ev". …

Member Avatar for OneRunner
0
172
Member Avatar for jhai_salvador

This is my Cogwheel Encryption Method to encrypt and decrypt strings. Wheel1 is Replace by Wheel2 when Encrypting and Wheel2 is Replace by wheel1 when you are decrypting... To Encrypt a string, just call the EncryptString function [CODE=vb] Text2.Text = EncryptString(Text1.Text) [/CODE] To Decrypt a string, just call the DecryptString …

Member Avatar for AndreRet
1
490
Member Avatar for bops

Hello. I am currently working on a little password based file encryption feature for an application I am doing. The following is an incomplete function that I have worked on to encrypt some content and (will eventually) write it to a file. [CODE]public static void encrypt(byte [] data, char [] …

Member Avatar for Stefano Mtangoo
0
340
Member Avatar for adman_2005

The program initially asks the user to insert the secret sentence and the encryption code (an integer number in the range 1-100). Then, the program calls a user-defined function void encrypter (char *, int) that accepts the string pointer and the encryption code. The encryption algorithm is based on the …

Member Avatar for jordan00191
0
414
Member Avatar for Korakos

Hello! I have i problem i was hoping you could help me with, I have to write a script that will ask the user for a username and password, and validate it through /etc/passwd and /etc/shadow. I've looked all over the place for an answer to this and i just …

Member Avatar for Korakos
0
248
Member Avatar for twistedphrame

Hi, I'm attempting to generate a new cipher key using a string that was negotiated earlier on. On running the code I get the error: Exception in thread "main" java.lang.IllegalArgumentException: Missing argument at javax.crypto.spec.SecretKeySpec.<init>(DashoA13*..) at shared.Cryptographer.makeCipher(Cryptographer.java:254) at client.Main.main(Main.java:60) Java Result: 1 the code is as follow: [CODE] public void makeCipher(String …

Member Avatar for twistedphrame
0
910
Member Avatar for MinimalStress

Hey guys, my name is Ross. Im new to programming and i need some help with assembler. I have a menu with a number of options that the user can do. 1. The first one is the user must input a string of characters up to the limit of 25 …

0
110
Member Avatar for newsguy

Back in 1976, along with Stanford University professor Martin Hellman, Whit Diffie produced quite possibly the most important paper in the history of cryptography. That paper, New Directions in Cryptography, laid the groundwork for solving one of the fundamental problems of cryptography, that of key distribution. Now Diffie himself is …

Member Avatar for Agni
0
577
Member Avatar for james chaco

I installed flycryptor software on my system to lock certain files and folders. Now the problem is that those files are encrypted and my friend have uninstalled the software .Those files appear somewhat scary to look at and are not opening properly. So is there any way by which i …

Member Avatar for chrishea
0
136
Member Avatar for Craig.

I have visited this forum many times in the past and I decided to actually join. My first question - where is the encryption algorithm actually implemented in bluethooth? more specifically bluez. I have been sifting through the bluez code trying to find this, and so far I have only …

0
100
Member Avatar for Kruptein

I have found a module pycrypto which has an AES encryption and decryption function, in commandline everything works fine both encryption and decryption, but if I want to implement it in my program, it fails =( [code=python]def aes(txt): global crypt message="".join(txt) #format the message which has to be encrypted/decrypted to …

Member Avatar for jcao219
0
222
Member Avatar for calccrypto

the rc6 paper say this [CODE]Key schedule for RC6-w/r/b Input: User-supplied b byte key preloaded into the c-word array L[0; ..., c - 1] Number r of rounds Output: w-bit round keys S[0; ..., 2r + 3] Procedure: S[0] = Pw for i = 1 to 2r + 3 do …

0
85
Member Avatar for calccrypto

can anyone tell me what i did wrong with the decryption part of this code? ive been looking at it for some time now (while working on other related stuff), and i cant seem to find the problem with it. its getting really retarded, on my part [B]and this is …

Member Avatar for calccrypto
0
155
Member Avatar for GPPK

Hi Guys, I'm really interested in C++ and am currently making a basic Text based poker game. on a sideline to this does anyone know any simple encryption code or where to start when doing this? For instance taking a text file (.txt or even .doc?) and creating your own …

Member Avatar for VernonDozier
0
98
Member Avatar for newsguy

Call the National Guard. On second thoughts, call someone else. After all, it is the National Guard which has somehow managed to lose an archival data disk containing five years worth of staff records covering some 15,000 personnel. The US National Guard is now recommending that any current and former …

1
146
Member Avatar for zinnqu

I have created a encryptor/decryptor that allows you to encrypt/decrypt text in a textbox, or a file. The basis of the system is to allow a user to thoroughly protect data within their system. Is there anyone that would be willing to test the program?

Member Avatar for zinnqu
0
167
Member Avatar for exeric90

Okay so lately I have been messing around with encryption. I thought I might give making my own simple encryption program a shot. So I am trying to make it. I am compiling my code in DEV C++ and when it runs, after I enter the message, nothing happens. It …

Member Avatar for jonsca
0
143
Member Avatar for sandorlev

Hello! I've started programming C++ a week ago, so I cannot solve my problems easily. I've started a small project for learning classes, it's about encryption and stuff. I don't really get pointers, although I've read some about them. My problem is that when I use the cipher, it replaces …

Member Avatar for vmanes
0
772
Member Avatar for unknowndevil41
Member Avatar for unknowndevil41
-1
84
Member Avatar for happygeek

Some might argue that it has been a bad year for encryption. After all, just as the last decade was ending came reports that the algorithm that is used to encrypt GSM mobile phone calls (as used by some 4 billion people around the world) had been cracked wide open. …

Member Avatar for HenryTom
3
632
Member Avatar for renjubenoy
Member Avatar for happygeek

According to a new survey of London taxi drivers, an average of 10,000 mobile phones are left behind by customers every single month. If that total is not staggeringly high enough, you can top it up with another 1000 iPods and memory sticks if you like. December is the worse …

Member Avatar for taxifinder
0
371

The End.