Information theory comes into play where ever encoding & decoding is present. For example: compression(multimedia), cryptography.
In Information Theory we encounter terms like "Entropy", "Self Information", "Mutual Information" and entire subject is based on these terms. Which just sound nothing more than abstract. Frankly, they don't r...
Hi all,
I am writing a client / server based program, Server side is with Php and Client is with Python, and I need to make sure the transfer data is safe both way.
So, My question is
What encryption algorithm would be best for data transfer between Python and Php?
I couldn't use Https
Need to decrypt/encrypt with key on both Pytho...
I'm encrypting a string in java,
encrypted data is only question marks
for eg .. plaintext : jjkkjlkljkj
encrypted text: ???????????
While i'm decrypting i'm getting jjkkjlkljkj exact answer ...
...
I'm developing a web application for which final users have to create an account. This part is very easy: I'll hash their passwords with SHA-256 so that nobody, except the user himself, knows the password. Now comes the difficult part. After the user creates an account, he/she has to provide the password of his/her email server. Now the ...
Hello,
I know almost nothing about cryptography, but I would like to figure out how to encrypt
an HTTP live stream and decrypt it on an iphone.
The apple docs for HTTP encryption read as follows:
////////////////////////////
Media files containing stream segments may be individually encrypted. When encryption is employed, references ...
It's not that I don't have access to javascript, of course. In most of my CS Web Development courses, we are taught a little bit about server-side validation, and then as soon as javascript is introduced, server-side validation is thrown out the window.
I choose not to just rely on javascript, as the client-side is never a secure place....
Sourceforge requires that you state whether your OSS uses encryption:
This project DOES incorporate, access, call upon or otherwise use encryption. Posting of open source encryption is controlled under U.S. Export Control Classification Number "ECCN" 5D002 and must be simultaneously reported by email to the U.S. government. You are r...
Hey. I would like to save sensitive user data to my apps sandbox but I know that if the phone is then stolen someone can "rip" (if thats the correct term) data off the device quite easily.
So I need to use encryption. But I can't use standard private-public keys without either storing them in the code. (not good im assuming as if the b...
Friend of mine wanted introduce in his company emails PGP encryption for exchange mails with clients. He asked me to write easy app supporting that.
I found useful dll wrapper - so it seems to be not very big deal to write app.
What puzzles me is security aspect. (I dont want to push him on the mine)
I know PGP uses private/public keys ...
I am looking into encrypting some sensitive data in SQL Server, such as bank account numbers and social security numbers in order to comply with new state laws. I am using SQL Server 2008 as my database with .NET code. I have used .NET to encrypt passwords, but for this I'm thinking of using Microsoft's built in encryption by just encryp...
Hello,
I have been google-ing and researching for an answer on how to do a simple RSA encryption using objective-c on an iphone. The main problem i have is that i have been supplied the Exponent and Modulus as an NSData object and i need to then convert them to a SecKeyRef object in order to perform the RSA encryption.
Does anyone have...
As many will know, one-way encryption is a handy way to encrypt user passwords in databases. That way, even the administrator of the database cannot know a user's password, but will have to take a password guess, encrypt that with the same algorithm and then compare the result with the encrypted password in the database. This means that ...
So far I have found an example for Django that uses M2Crypto, but because M2Crypto is based on a C library, it cannot be run on GAE. Does anyone have a working code for creating an encrypted PayPal button dynamically in Google App Engine?
In a nutshell, I need to translate the following Ruby code into Python. It's taken from PayPal's We...
Do you know of a reliable way to encrypt an entire Subversion repository?
I host the repository on my dedicated server (FreeBSD), but would like to add encryption so my source code cannot be stolen in readable format if someone hacks into my server.
I prefer a server side solution as different SVN clients may be used.
Possible?
...
I'm developing an "offline" application for a local government that will be used to collect sensitive information. The application will sync back up to the mothership periodically, but it will generally be used offline.
It'll be running on Windows, written in .NET/WPF. I'll need a small "local" database, so I'm looking at SQLite. I c...
For a webapplication, when HTTPS is not available as a security measure, is it possible to still make the login somewhat secure? E.g.:
Tokenize logins, to make repeat attacks difficult?
Somehow encrypt the sent password from a HTML password field?
In particular I'm using CakePHP and an AJAX POST call to trigger authentication (includ...
I am looking for an algorithm to change it's keys every period and can still be deciphered.
Basically I am looking for a way to maintain a secured link between mobile clients and a stationary server in such a way that even if you intercepted the hash or even the authentication credentials themselves they would change on both sides every ...
Hi,
I am working on a desktop app that will use Lucerne as search engine. The app will be installed on the user's machine and the index will be stored on the local hard disk.
The data is potentially confidential so I would like to protect the index from unauthorized access. The data needs to be secure even when the user's machine gets ...
In my Python web app, I would need to decrypt a file that was encrypted using VIM. Assuming the web app knows the password used to encrypt the file in VIM, how do I write code to decrypt ?
...
Message Level Security using X509 certificates in DotNet:
Application 1
Certificate: Application 1 holds Certificate 1 and its Private Key
Personal Store: Certificate 1 is installed in the Personal Store of Application 1
Trusted Store: Certificate 2’s public part is installed in the Trusted Store of Application 1
Encryption: Encryp...