OK you can go ahead. I would not be interested in some technology people used to have in the stone age. And World War 2 is stone age in the context of computation.
On Thu, Jul 19, 2012 at 3:56 PM, Rishabh.rammstien <[email protected]>wrote: > hi Debasish, > > As i have already said its simple algorithm to encrypt bytes. But brother > this simple encryption is very powerful and was used by German Army during > world war 2. Haven't you heard of Lorenz > cipher<http://en.wikipedia.org/wiki/Lorenz_cipher>. > And by the way there is no encryption in world which can't be cracked its > always the matter of time and knowledge. > > Yo! > Rishabh Sharma > > > > > On Thursday, July 19, 2012 12:02:39 PM UTC+5:30, Debasish wrote: >> >> Hi Rishabh, >> It is not a good idea to advice someone to use your own self created >> algorithm no matter how smart you are, unless the algorithm is published in >> a renowned journal paper, and tested by every veteran and mathematician in >> the world upto at least some time, and is accepted by them as a good >> algorithm. My friend might not break it, you may not break it, but that >> does not mean no one in the world can. >> >> Remember that trying all the permutation might not be required, there may >> be other ways. The first thing about a good encryption algorithm is to make >> sure (with established mathematical facts, may be not proven to be so, but >> also not proven to be wrong for centuries. for example the fact that there >> is no efficient algorithm to factorize the product of two primes) that the >> only way to break it is by non-statistical brute forcing. After you have >> that, its just a matter of choosing large enough values to really make it >> difficult. >> >> On Thu, Jul 19, 2012 at 11:19 AM, Rishabh.rammstien <[email protected] >> > wrote: >> >>> I have given a basic encryption example the same algorithm can be made >>> more complex. >>> For Example in my above post i have used 1 byte encryption. >>> For Encryption you can use n number of bytes where >>> n=1,2,3,4,5,6,7,8,9........ >>> higher the value of n more stronger will be the encryption and more >>> number of permutation combinations hacker need to do to decrypt the file >>> which seems impossible to me. >>> >>> Try my application RCrypto >>> <http://sourceforge.net/projects/rcrypto/files/RCrypto%20Beta%283.0%29%20%28xp%2Cvista%20%2C7%29.exe/download>(for >>> windows) it uses 8-byte encryption and just try to break it or ask your >>> hacker friend to break it. >>> >>> >>> On Wednesday, July 18, 2012 12:16:53 PM UTC+5:30, Debasish wrote: >>>> >>>> That's not encryption, any skilled hacker will break it in a few >>>> minutes. That is why so many people have created such good secure >>>> algorithms. >>>> >>>> On Wed, Jul 18, 2012 at 11:22 AM, Rishabh.rammstien < >>>> [email protected]> wrote: >>>> >>>>> Hi, >>>>> >>>>> You can use simple c++ XOR algorithm to encrypt the file. >>>>> suppose 8 bit password entered by user is 10101010 >>>>> >>>>> Encrypt byte :11010010 >>>>> 11010010 >>>>> XOR Encrypted Output= 01111000 >>>>> 10101010 >>>>> >>>>> Decrypt byte: 01111000 >>>>> 01111000 >>>>> XOR Decrypted Output= 11010010 >>>>> 10101010 >>>>> Done >>>>> >>>>> Rishabh Sharma >>>>> Anantya R&D >>>>> >>>>> On Tuesday, July 17, 2012 6:38:24 PM UTC+5:30, TeknoCepni wrote: >>>>>> >>>>>> Hi, >>>>>> >>>>>> I want to encrypt the file then one software decipher this file and >>>>>> read it. >>>>>> How can I do it ? >>>>>> >>>>>> Programming language : C++ >>>>>> Ofcourse in Linux. >>>>>> >>>>>> >>>>>> Huseyin Caliskan >>>>>> >>>>>> >>>>>> -- >>>>> Mailing list guidelines and other related articles: >>>>> http://lug-iitd.org/Footer >>>>> >>>> >>>> >>>> >>>> -- >>>> Debasish Ray Chawdhuri >>>> http://www.geekyarticles.com/ >>>> [A collection of advanced articles on java] >>>> >>>> -- >>> Mailing list guidelines and other related articles: >>> http://lug-iitd.org/Footer >>> >> >> >> >> -- >> Debasish Ray Chawdhuri >> http://www.geekyarticles.com/ >> [A collection of advanced articles on java] >> >> -- > Mailing list guidelines and other related articles: > http://lug-iitd.org/Footer > -- Debasish Ray Chawdhuri http://www.geekyarticles.com/ [A collection of advanced articles on java] -- Mailing list guidelines and other related articles: http://lug-iitd.org/Footer
