encryption

Practical way of explaining "Information Theory"

Information theory comes into play where ever encoding & decoding is present. For example: compression(multimedia), cryptography. In Information Theory we encounter terms like "Entropy", "Self Information", "Mutual Information" and entire subject is based on these terms. Which just sound nothing more than abstract. Frankly, they don't r...

What encryption algorithm would be best for data transfer between Python and Php?

Hi all, I am writing a client / server based program, Server side is with Php and Client is with Python, and I need to make sure the transfer data is safe both way. So, My question is What encryption algorithm would be best for data transfer between Python and Php? I couldn't use Https Need to decrypt/encrypt with key on both Pytho...

Only question Marks while encrypting. Is it good to encrypt like this.

I'm encrypting a string in java, encrypted data is only question marks for eg .. plaintext : jjkkjlkljkj encrypted text: ??????????? While i'm decrypting i'm getting jjkkjlkljkj exact answer ... ...

How to Protect Sensible Passwords stored in a Database

I'm developing a web application for which final users have to create an account. This part is very easy: I'll hash their passwords with SHA-256 so that nobody, except the user himself, knows the password. Now comes the difficult part. After the user creates an account, he/she has to provide the password of his/her email server. Now the ...

AES 128 Encryption for iPhone HTTP Stream

Hello, I know almost nothing about cryptography, but I would like to figure out how to encrypt an HTTP live stream and decrypt it on an iphone. The apple docs for HTTP encryption read as follows: //////////////////////////// Media files containing stream segments may be individually encrypted. When encryption is employed, references ...

How do I encode passwords in web forms without javascript?

It's not that I don't have access to javascript, of course. In most of my CS Web Development courses, we are taught a little bit about server-side validation, and then as soon as javascript is introduced, server-side validation is thrown out the window. I choose not to just rely on javascript, as the client-side is never a secure place....

Notification Requirements for "Publicly Available" Encryption Source Code

Sourceforge requires that you state whether your OSS uses encryption: This project DOES incorporate, access, call upon or otherwise use encryption. Posting of open source encryption is controlled under U.S. Export Control Classification Number "ECCN" 5D002 and must be simultaneously reported by email to the U.S. government. You are r...

iphone security data encryption

Hey. I would like to save sensitive user data to my apps sandbox but I know that if the phone is then stolen someone can "rip" (if thats the correct term) data off the device quite easily. So I need to use encryption. But I can't use standard private-public keys without either storing them in the code. (not good im assuming as if the b...

PGP passphrases in company

Friend of mine wanted introduce in his company emails PGP encryption for exchange mails with clients. He asked me to write easy app supporting that. I found useful dll wrapper - so it seems to be not very big deal to write app. What puzzles me is security aspect. (I dont want to push him on the mine) I know PGP uses private/public keys ...

How to control what users can decrypt SQL Server Symmetric Key Encryption

I am looking into encrypting some sensitive data in SQL Server, such as bank account numbers and social security numbers in order to comply with new state laws. I am using SQL Server 2008 as my database with .NET code. I have used .NET to encrypt passwords, but for this I'm thinking of using Microsoft's built in encryption by just encryp...

IPhone/Objective-c RSA encryption

Hello, I have been google-ing and researching for an answer on how to do a simple RSA encryption using objective-c on an iphone. The main problem i have is that i have been supplied the Exponent and Modulus as an NSData object and i need to then convert them to a SecKeyRef object in order to perform the RSA encryption. Does anyone have...

What is currently the most secure one-way encryption algorithm?

As many will know, one-way encryption is a handy way to encrypt user passwords in databases. That way, even the administrator of the database cannot know a user's password, but will have to take a password guess, encrypt that with the same algorithm and then compare the result with the encrypted password in the database. This means that ...

How do I create an encrypted PayPal button dynamically in Google App Engine?

So far I have found an example for Django that uses M2Crypto, but because M2Crypto is based on a C library, it cannot be run on GAE. Does anyone have a working code for creating an encrypted PayPal button dynamically in Google App Engine? In a nutshell, I need to translate the following Ruby code into Python. It's taken from PayPal's We...

Encrypted Subversion repository

Do you know of a reliable way to encrypt an entire Subversion repository? I host the repository on my dedicated server (FreeBSD), but would like to add encryption so my source code cannot be stolen in readable format if someone hacks into my server. I prefer a server side solution as different SVN clients may be used. Possible? ...

Securing/encrypting an offline application

I'm developing an "offline" application for a local government that will be used to collect sensitive information. The application will sync back up to the mothership periodically, but it will generally be used offline. It'll be running on Windows, written in .NET/WPF. I'll need a small "local" database, so I'm looking at SQLite. I c...

Login without HTTPS, how to secure?

For a webapplication, when HTTPS is not available as a security measure, is it possible to still make the login somewhat secure? E.g.: Tokenize logins, to make repeat attacks difficult? Somehow encrypt the sent password from a HTML password field? In particular I'm using CakePHP and an AJAX POST call to trigger authentication (includ...

Self modifying hash encryption algorithm

I am looking for an algorithm to change it's keys every period and can still be deciphered. Basically I am looking for a way to maintain a secured link between mobile clients and a stationary server in such a way that even if you intercepted the hash or even the authentication credentials themselves they would change on both sides every ...

How to secure/encrypt a Lucene index?

Hi, I am working on a desktop app that will use Lucerne as search engine. The app will be installed on the user's machine and the index will be stored on the local hard disk. The data is potentially confidential so I would like to protect the index from unauthorized access. The data needs to be secure even when the user's machine gets ...

Decrypt VIM encrypted file in Python

In my Python web app, I would need to decrypt a file that was encrypted using VIM. Assuming the web app knows the password used to encrypt the file in VIM, how do I write code to decrypt ? ...

Implementation of Message Level Security using X509 certificates in DotNet

Message Level Security using X509 certificates in DotNet: Application 1 Certificate: Application 1 holds Certificate 1 and its Private Key Personal Store: Certificate 1 is installed in the Personal Store of Application 1 Trusted Store: Certificate 2’s public part is installed in the Trusted Store of Application 1 Encryption: Encryp...