Kenny, are you saying you want to implement security *within* your Flex app? I think you'd have serious security holes with that (your decompilation concern, for one). Typically security would be handled at the client-server level, by hosting your SWF on a server that has been configured to accept connections over https (e.g., https://myserver.com/myapp), connecting to your app via HTTPS from a browser, and designing your Flex app to connect to other servers over HTTPS as well. Web servers and browsers already have built-in implementations of RSA, SSL/TLS, and the other "industry standards" mentioned in other posts so there's really no need to implement them yourself. The same SWF (with certain design considerations taken into account, of course) can be accessed on the web non-securely (over HTTP), or securely (over HTTPS).
HTH, Doug --- In flexcoders@yahoogroups.com, "kenny14390" <[EMAIL PROTECTED]> wrote: > > So the bottom line is to use an algorithm like RSA? To take a much > simpler example, if the Flex app receives the encrypted data "1234" > and it wishes to use that data, it must first decrypt it. So it > performs the decryption in some AS and now you have the decrypted data > that you wanted. My question now is, if someone decompiles your app > they can see your decryption method and thus decode the data on their > own. Nothing is private in the Flex app due to the decompilation concern. > > Regarding SSL, I suppose this is out of the question if we're talking > about a Facebook application. I don't have much control over their > security. > > --- In flexcoders@yahoogroups.com, "andrewwestberg" > <andrewwestberg@> wrote: > > > > I think you're confusing simple secret key encryption (DES, AES, > > etc..) with public/private key encryption (RSA). > > > > In secret-key encryption if an attacker steals the data and guesses or > > brute forces the secret key, they can see the data. > > > > In public/private key encryption, a message you send to the server is > > encrypted by a public key and can ONLY be decrypted by a private key > > known only to the webserver (the certificate you bought from verisign, > > thawte, etc...) This is how when you sign onto paypal or some other > > site over https, you don't have to worry about your credit-card being > > stolen in transmission. Sitting in some DB at the company where > > employees can get at it, you should worry, but during transmission, > > it's unlikely to get cracked. > > > > -Andrew > > >