Hi,
I wanted to develop code in java for a cryptographic algorithms like Blowfish,RC5. I searched on the internet too but I got to know that Blowfish has ready made methods available. So writing own methods is like 'reinventing wheel' so is the same case with 'RC5' too?
If this is the case, can you please suggest me some algorithm...
Hi,
In the current project I would like to create my own hash function but so far haven't gained much theoretical background on hashing principle.
I would be very thankful if anyone of you could suggest any useful resource about the theory of hashing, cryptography and practical implementations of hash functions.
Thank you!
P.S. As ha...
I am looking for existing implementations of different types of DES in C/C++/C##. My running platform is Windows XP/Vista/7.
I am trying to write a C# program which will encrypt and decrypt using the DES algorithm. I need some implementations with which i can verify my code output to see if i did the things in right order. For the imple...
I have an X.509 certificate that contains a set of data with the following IMPLICIT [0] tag:
A0 81 C6 (value)...
And I have this excerpt from a standards document:
The IMPLICIT [0] tag is not used for
the DER encoding, rather an EXPLICIT
SET OF tag is used. That is, the DER
encoding of the EXPLICIT SET OF tag,
rather than...
I'd like to determine if a given x509 Certificate is an EV cert using C#. Since there are no properties available to me in the .NET API and I'm not sure where to get more information on this standard, I'm a bit stuck.
Does anyone have the answer, or know where I should start looking inside the binary blob?
...
I am reading http://www.definityhealth.com/marketing/how_ssl_works.html
Looks like SSL is using asymmetric algorithm to exchange the symmetric key, after that it uses symmetric algorithm to encrypt the data.
One question, can I use asymmetric algorithm only? Like Alice and Bob both have certificate and, they are all using peer's public...
I know you should never make your own cryptography, whether it is a cipher or hashing algorithm or even a secure pseudo random number generator these things I developed over a long standardisation process. However what I'm looking for quotes or good point in order to quickly describe/argue this to the occasional developer that decides to...
Hello,
I have a content application that stores PKCS7 detached signatures in a database and the original file on the disk.
Now I'll have to send an unique file to a customer containing the original document and the signature, as it if were signed attached. Note that the document hasn't been and won't be encrypted.
Does someone knows how ...
To build a secure system can we assume my question before starting programming.
Both in symmetric and public-key
encryption, is my question
well-proofed ?
If no, what are the
vulnerabilities, can you give an
example?
...
I'm looking to integrate a J2EE app running on JBoss with RSA's Access Manager (which provides authentication with SecurID tokens).
The documentation I've found so far is pretty sparse. RSA's site says there are "
Java Runtime API and Admin API; Web Services Interfaces for runtime and admin" but I haven't found more details.
Any pointe...
Hi,
I know how to encrypt data using ColdFusion using AES_128. I also know how to encrypt data using MSSQL AES_128. Does anyone know if it’s possible to encrypt data in ColdFusion using AES_128, then decrypt the string in MSSQL?
I’ve played around with it a lot and can’t seem to figure it out.
Thanks,
Paul
...
I'm using tomcat 6, spring mvc 3.0.0 and spring security 3.0.0, and since the passwords I store in the database are sha1 hashed, I can't use digest authentication (section 9.2.1 of the documentation spells that out). For this reason, I need to make authentication happen through https.
Due to potential processing overhead, I want to keep...
I have some data I want to encrypt in an ASP.NET MVC application to prevent users from tampering with it. I can use the Cryptography classes to do the actual encryption/decryption, no problem there. The main problem is figuring out where to store the encryption key and managing changes to it.
Since ASP.NET already maintains a machineK...
From my reading I am not sure if AES is a single, standardized algorithm that can work with different length keys, or a family of similar algorithms? What I mean is if I find any 2 AES implementations taking a 128-bit key, should I be confident they will work identically (barring bugs)?
Specifically in .Net/C#, I was confused why there ...
Abstract: Is there a way, either via Firefox plugin or other means to emulate javascript crypto.signText using an opaque algorithm instead of detached (what it currently does?) to sign arbitrary data. This includes the dialog box and access to the Firefox cert store. Also, the signText documentation doesn't seem to have been updated sinc...
I'm getting an encrypted string from an external service that I need to decrypt, and then re-encrypt using the BouncyCastle API.
I've managed to get decryption working fine, but encryption doesn't seem to work. When I try to decrypt a string generated by my encryption method I get an InvalidCipherTextException with the message "unknown ...
I would like to do some iPhone development from my Windows box using the Adobe iPhone packager. I get how to do pretty much everything except creating / obtaining the certificates and provisioning files needed to complete the packaging process. What is the easiest and quickest way to get up and running?
...
Hi,
I have been reading about /dev/urandom, and as far as I can tell, /dev/random creates cryptographically random numbers by taking advantage of several events like network packet timings, etc. However, did I understand right that /dev/urandom uses a PRNG, seeded with a number from /dev/random? Or does it just use /dev/random as long a...
Anyone know where I could find sample code for this with system.security.cryptography namespace -- or instructions followable by a developer?
The purpose is to add two-factor authentication to an asp.net website. On website I want to ask user to enter a passcode (similar to if they got it from a keyfob). On the client side I want to pro...
Clarification: no python program necessary. This is not homework
cryptogram - two variations - most likely by substitution - please help me solve:
cfcfcf
adgddlb
cfcicmc
gddo
bcfcfc
dgddg
cfcjcfc
dgdhgo
cfcfb
ehk
cb
(or)
ab
cdccdcdce
fgfgfgfgf
cdcdcdcdchc
fifjfb
cdcdcdchk
flmgfgn
bcoco
...