cryptography

Implimenting blowfish and RC5 in java

Hi, I wanted to develop code in java for a cryptographic algorithms like Blowfish,RC5. I searched on the internet too but I got to know that Blowfish has ready made methods available. So writing own methods is like 'reinventing wheel' so is the same case with 'RC5' too? If this is the case, can you please suggest me some algorithm...

How to create a hash function to mask confidential informations?

Hi, In the current project I would like to create my own hash function but so far haven't gained much theoretical background on hashing principle. I would be very thankful if anyone of you could suggest any useful resource about the theory of hashing, cryptography and practical implementations of hash functions. Thank you! P.S. As ha...

DES implementation in C/C++/C#

I am looking for existing implementations of different types of DES in C/C++/C##. My running platform is Windows XP/Vista/7. I am trying to write a C# program which will encrypt and decrypt using the DES algorithm. I need some implementations with which i can verify my code output to see if i did the things in right order. For the imple...

DER encoding - How to convert implicit tag to explicit tag

I have an X.509 certificate that contains a set of data with the following IMPLICIT [0] tag: A0 81 C6 (value)... And I have this excerpt from a standards document: The IMPLICIT [0] tag is not used for the DER encoding, rather an EXPLICIT SET OF tag is used. That is, the DER encoding of the EXPLICIT SET OF tag, rather than...

How do I validate and access EV properties of a EV Certificate?

I'd like to determine if a given x509 Certificate is an EV cert using C#. Since there are no properties available to me in the .NET API and I'm not sure where to get more information on this standard, I'm a bit stuck. Does anyone have the answer, or know where I should start looking inside the binary blob? ...

SSL is half symmetric and half asymmetric?

I am reading http://www.definityhealth.com/marketing/how_ssl_works.html Looks like SSL is using asymmetric algorithm to exchange the symmetric key, after that it uses symmetric algorithm to encrypt the data. One question, can I use asymmetric algorithm only? Like Alice and Bob both have certificate and, they are all using peer's public...

Home-Made Cryptography

I know you should never make your own cryptography, whether it is a cipher or hashing algorithm or even a secure pseudo random number generator these things I developed over a long standardisation process. However what I'm looking for quotes or good point in order to quickly describe/argue this to the occasional developer that decides to...

Add content to PKCS7 detached signature

Hello, I have a content application that stores PKCS7 detached signatures in a database and the original file on the disk. Now I'll have to send an unique file to a customer containing the original document and the signature, as it if were signed attached. Note that the document hasn't been and won't be encrypted. Does someone knows how ...

Does encryption guarantee integrity ?

To build a secure system can we assume my question before starting programming. Both in symmetric and public-key encryption, is my question well-proofed ? If no, what are the vulnerabilities, can you give an example? ...

Integrate RSA SecurID authentication with a j2ee server?

I'm looking to integrate a J2EE app running on JBoss with RSA's Access Manager (which provides authentication with SecurID tokens). The documentation I've found so far is pretty sparse. RSA's site says there are " Java Runtime API and Admin API; Web Services Interfaces for runtime and admin" but I haven't found more details. Any pointe...

SQL & ColdFusion Encryption

Hi, I know how to encrypt data using ColdFusion using AES_128. I also know how to encrypt data using MSSQL AES_128. Does anyone know if it’s possible to encrypt data in ColdFusion using AES_128, then decrypt the string in MSSQL? I’ve played around with it a lot and can’t seem to figure it out. Thanks, Paul ...

Require authentication through https with spring security?

I'm using tomcat 6, spring mvc 3.0.0 and spring security 3.0.0, and since the passwords I store in the database are sha1 hashed, I can't use digest authentication (section 9.2.1 of the documentation spells that out). For this reason, I need to make authentication happen through https. Due to potential processing overhead, I want to keep...

Leveraging ASP.NET machineKey For Encrypting My Own Data

I have some data I want to encrypt in an ASP.NET MVC application to prevent users from tampering with it. I can use the Cryptography classes to do the actual encryption/decryption, no problem there. The main problem is figuring out where to store the encryption key and managing changes to it. Since ASP.NET already maintains a machineK...

AES Encryption and C#

From my reading I am not sure if AES is a single, standardized algorithm that can work with different length keys, or a family of similar algorithms? What I mean is if I find any 2 AES implementations taking a 128-bit key, should I be confident they will work identically (barring bugs)? Specifically in .Net/C#, I was confused why there ...

Signing data with PKCS #7 (opaque) for the web

Abstract: Is there a way, either via Firefox plugin or other means to emulate javascript crypto.signText using an opaque algorithm instead of detached (what it currently does?) to sign arbitrary data. This includes the dialog box and access to the Firefox cert store. Also, the signText documentation doesn't seem to have been updated sinc...

BouncyCastle Decryption works, but not Encryption?

I'm getting an encrypted string from an external service that I need to decrypt, and then re-encrypt using the BouncyCastle API. I've managed to get decryption working fine, but encryption doesn't seem to work. When I try to decrypt a string generated by my encryption method I get an InvalidCipherTextException with the message "unknown ...

How to generate certificates and provisioning files for iPhone development in Windows

I would like to do some iPhone development from my Windows box using the Adobe iPhone packager. I get how to do pretty much everything except creating / obtaining the certificates and provisioning files needed to complete the packaging process. What is the easiest and quickest way to get up and running? ...

Did I understand /dev/urandom?

Hi, I have been reading about /dev/urandom, and as far as I can tell, /dev/random creates cryptographically random numbers by taking advantage of several events like network packet timings, etc. However, did I understand right that /dev/urandom uses a PRNG, seeded with a number from /dev/random? Or does it just use /dev/random as long a...

How can you generate OTP with system.security.cryptography that can be authenticated on client?

Anyone know where I could find sample code for this with system.security.cryptography namespace -- or instructions followable by a developer? The purpose is to add two-factor authentication to an asp.net website. On website I want to ask user to enter a passcode (similar to if they got it from a keyfob). On the client side I want to pro...

Show process of solution?

Clarification: no python program necessary. This is not homework cryptogram - two variations - most likely by substitution - please help me solve: cfcfcf adgddlb cfcicmc gddo bcfcfc dgddg cfcjcfc dgdhgo cfcfb ehk cb (or) ab cdccdcdce fgfgfgfgf cdcdcdcdchc fifjfb cdcdcdchk flmgfgn bcoco ...