encryption-asymmetric

Encryption/Decryption using X509 certificate in biztalk custome pipeline component

Hi All, I need to use X509 certificate in the BizTalk Custom Pipeline component to Encrypt/Sign the message and to Decrypt/Verify signature, please let me know some good samples/artcile/blogs etc which explains how to acheive this. RSA needs to be the encrypton algoritham. Thanks. ...

Is is possible to encrypt in a different order than decrypting?

Is it possible to encrypt in one order and decrypt in another? For example I've got the following: plain_text.txt Public/Private Key pair 1 Public/Private Key pair 2 Example Encryption: public1(public2(plain_text.txt)) Decryption: private1(private2(encrypted)) Is there any encryption algorithm that allows this? Is it even pos...

Faster asymmetric cipher than RSA

I've been working on a system that uses asymmetric encryption in a large number of files. I'm currently using RSA with 4096-bit keys to encrypt a 256-bit randomly generated AES key for each file, but performance is somewhat lacking, as one required operation is to scan through all the files (estimated number when the system is in use is...

Is there a physical lock that can demonstrate asymmetric crytographic principles?

I wish to demonstrate asymmetric encryption using real-world locks. For example, I want to write a secret on a piece of paper and deposit it in a locked box. Is there a lock I can buy that comes with two keys, one that only locks the lock and another that only unlocks the lock? ...

How can I encrypt a user's password in Silverlight?

I have a Silverlight 3 app which connects to a server to perform various actions. My users log in using Forms Authentication but the actions they request are run on the server using the AppPool account so when they go in the audit logs they're recorded against the AppPool account. PCI DSS regulations now require that the user's own ID ...

Fast asymmetric cypher for C++ application

Hello. I'm looking for a fast asymmetric cypher algorithm to be used in C++ program. Our application accesses read-only data stored in archive (custom format, somewhat similar to tar), and I would like to prevent any modifications of that archive by asymmetrically encrypting archive index (I'm aware that this isn't a perfect solution an...

Is there a way to alter a public key in a way that the decryption can still be done with the private key after some alteration?

In an asymetric encryption scheme, I was wondering if it's possible to achieve the following: Bob sends to Alice his public key Alice alters Bob's public key and encrypt some document with it Alice sends the encrypted document to Bob Bob retrieve the document but can't decrypt it with his private key Later, Alice sends some additional ...

Is there a 8 bit block sized Public-Private key encryption algorithm?

I checked out TripleDES. It's block size is of 64 bits. Is there any algorithm for 8 bits block size? Thanks EDIT : I intend not to use this for perfect protection, but for a just-in-case situation where one who sees the code should not find the plaintext. So 8 bit is kinda okay for me. ...

Encrypt Data using Public Key

$key = file_get_contents('http://keyserver.pramberger.at/pks/lookup?op=get&search=uid'); after getting public key in '$key' variable i need to encrypt the data using this public key. the key must be start with ----Begin pgp block ---to end pgp block----. How this can be done in php? ...

Verify p2p node

Hey guys, I have been working on a p2p namespace for some of my programs. I created a system to encrypt/decrypt the packets send/received with the class. I was using the basic public private key system: 1) encrypt the data with Symmetric encryption 2) encrypt the symmetric key with RSA. Then do the opposite when you decrypted.. I was...

Decrypting “long” message encrypted with RSA java

Hi this is the same question, that was asked two years ago: Java/JCE: Decrypting “long” message encrypted with RSA I had a large byte array and rsa keypair, initiated by value 1024. Using rsa encryption and the specified size of the key is strong requirement, I can't change it. So I can't use symmetric encryption with asymetric encrypti...

Java RSA Encrypt - Decrypt .NET - need help

I am encrypting on JAVA using RSA and attempting to decrypt using .NET. I am including my JAVA code and .NET code in hopes that someone has some experience with this sort of thing. JAVA Code: byte[] modulusBytes = Base64.decode("xTSiS4+I/x9awUXcF66Ffw7tracsQfGCn6g6k/hGkLquHYMFTCYk4mOB5NwLwqczwvl8HkQfDShGcvrm47XHKUzA8iadWdA5n4toBEC...

SQL Encryption - Asymmetric Key - 2nd Server

Hello, I created an asymmetric key on one of my SQL servers (2008). I encrypted a password field and I am able to retrieve that password just fine on my development server. The issue comes into play where I need to move this data to a production server. Here is the code for the key that was created: CREATE MASTER KEY ENCRYPTION BY P...

how to encrypt the information in iPhone using a 1024-bit asymmetric public/private key scheme ??

I want to encrypt some data like image,sound file or text .is there any tutorial/example available for encryption using a 1024-bit asymmetric public/private key. please provide any link available for the encryption in iphone.. ...

how to produce a key pair for 64 bit public key encryption

I need to generate a 64 bit public-private key pair but can't find out any standard algorithm....... How do I do that? Someone please reply asap ...

Delphi asymmetric encryption

I'm looking for a Delphi implementation of an asymmetric encryption algorithm without any dependencies on external DLLs. Is there any available? My goal is to encrypt/decrypt a string (or array of bytes) using a public/private key pair. ...

RSA: Encrypting message using multiple keys

Is it possible to get additional security by encrypting a message using 2 or more RSA keys? EDIT: A few clarifications: The context I am most interested in doing this for is encrypting a randomly generated symmetric key. I don't want to limit the question to encrypting twice in a row; the purpose is to avoid the high computational cos...

Is it possible to use pure Encrypting and Decrypting keys in asymmetric cryptography instead of private and public keys?

Is it possible to use pure Encrypting and Decrypting keys instead of private and public keys? As I know in .Net asymmetric RSA implementation private key RSAParameters parameters = (new RSACryptoServiceProvider()).ExportParameters(true) is a superset of public key. And using private key we can both encrypt and decrypt our data. But I nee...

Storing public and private keys in a Database or keystore

I am making a web service that will store public and private keys for each record in a database table. The keys are made using Java, but I am unsure weather to create a keystore or place the keys inside fields in the databbase directly. What option would you recommend and what are the benefits of each method? ...

Asynchronous Key Systems?

I understand the basic system of public vs. private keys and how if I want to send a person something, I need their public key and they decrypt with their private key, but what kind of logical mechanisms are at play so that a private key can decrypt what a public key encrypted? For example, say I wanted to write my own asynchronous key s...