OK you can go ahead. I would not be interested in some technology people
used to have in the stone age. And World War 2 is stone age in the context
of computation.

On Thu, Jul 19, 2012 at 3:56 PM, Rishabh.rammstien <[email protected]>wrote:

> hi Debasish,
>
> As i have already said its simple algorithm to encrypt bytes. But brother
> this simple encryption is very powerful and was used by German Army during
> world war 2. Haven't you  heard of Lorenz 
> cipher<http://en.wikipedia.org/wiki/Lorenz_cipher>.
> And by the way there is no encryption in world which can't be cracked its
> always the matter of time and knowledge.
>
> Yo!
> Rishabh Sharma
>
>
>
>
> On Thursday, July 19, 2012 12:02:39 PM UTC+5:30, Debasish wrote:
>>
>> Hi Rishabh,
>> It is not a good idea to advice someone to use your own self created
>> algorithm no matter how smart you are, unless the algorithm is published in
>> a renowned journal paper, and tested by every veteran and mathematician in
>> the world upto at least some time, and is accepted by them as a good
>> algorithm. My friend might not break it, you may not break it, but that
>> does not mean no one in the world can.
>>
>> Remember that trying all the permutation might not be required, there may
>> be other ways. The first thing about a good encryption algorithm is to make
>> sure (with established mathematical facts, may be not proven to be so, but
>> also not proven to be wrong for centuries. for example the fact that there
>> is no efficient algorithm to factorize the product of two primes) that the
>> only way to break it is by non-statistical brute forcing. After you have
>> that, its just a matter of choosing large enough values to really make it
>> difficult.
>>
>> On Thu, Jul 19, 2012 at 11:19 AM, Rishabh.rammstien <[email protected]
>> > wrote:
>>
>>> I have given a basic encryption example the same algorithm can be made
>>> more complex.
>>> For Example in my above post i have used 1 byte encryption.
>>> For Encryption you can use n number of bytes where
>>> n=1,2,3,4,5,6,7,8,9........
>>> higher the value of n more stronger will be the encryption and more
>>> number of permutation combinations hacker need to do to decrypt the file
>>> which seems impossible to me.
>>>
>>> Try my application RCrypto
>>> <http://sourceforge.net/projects/rcrypto/files/RCrypto%20Beta%283.0%29%20%28xp%2Cvista%20%2C7%29.exe/download>(for
>>> windows) it uses 8-byte encryption and just try to break it or ask your
>>> hacker friend to break it.
>>>
>>>
>>> On Wednesday, July 18, 2012 12:16:53 PM UTC+5:30, Debasish wrote:
>>>>
>>>> That's not encryption, any skilled hacker will break it in a few
>>>> minutes. That is why so many people have created such good secure
>>>> algorithms.
>>>>
>>>> On Wed, Jul 18, 2012 at 11:22 AM, Rishabh.rammstien <
>>>> [email protected]> wrote:
>>>>
>>>>> Hi,
>>>>>
>>>>> You can use simple c++ XOR algorithm to  encrypt the file.
>>>>> suppose 8 bit password entered by user is 10101010
>>>>>
>>>>> Encrypt byte :11010010
>>>>> 11010010
>>>>>    XOR         Encrypted Output= 01111000
>>>>> 10101010
>>>>>
>>>>> Decrypt byte: 01111000
>>>>> 01111000
>>>>>     XOR         Decrypted Output= 11010010
>>>>> 10101010
>>>>> Done
>>>>>
>>>>> Rishabh Sharma
>>>>> Anantya R&D
>>>>>
>>>>> On Tuesday, July 17, 2012 6:38:24 PM UTC+5:30, TeknoCepni wrote:
>>>>>>
>>>>>> Hi,
>>>>>>
>>>>>> I want to encrypt the file then one software decipher this file and
>>>>>> read it.
>>>>>> How can I do it ?
>>>>>>
>>>>>> Programming language : C++
>>>>>> Ofcourse in Linux.
>>>>>>
>>>>>>
>>>>>> Huseyin Caliskan
>>>>>>
>>>>>>
>>>>>>  --
>>>>> Mailing list guidelines and other related articles:
>>>>> http://lug-iitd.org/Footer
>>>>>
>>>>
>>>>
>>>>
>>>> --
>>>> Debasish Ray Chawdhuri
>>>> http://www.geekyarticles.com/
>>>> [A collection of advanced articles on java]
>>>>
>>>>  --
>>> Mailing list guidelines and other related articles:
>>> http://lug-iitd.org/Footer
>>>
>>
>>
>>
>> --
>> Debasish Ray Chawdhuri
>> http://www.geekyarticles.com/
>> [A collection of advanced articles on java]
>>
>>  --
> Mailing list guidelines and other related articles:
> http://lug-iitd.org/Footer
>



-- 
Debasish Ray Chawdhuri
http://www.geekyarticles.com/
[A collection of advanced articles on java]

-- 
Mailing list guidelines and other related articles: http://lug-iitd.org/Footer

Reply via email to