Thanks everyone ... On 19 July 2012 14:20, Debasish Ray Chawdhuri < [email protected]> wrote:
> OK you can go ahead. I would not be interested in some technology people > used to have in the stone age. And World War 2 is stone age in the context > of computation. > > On Thu, Jul 19, 2012 at 3:56 PM, Rishabh.rammstien > <[email protected]>wrote: > >> hi Debasish, >> >> As i have already said its simple algorithm to encrypt bytes. But brother >> this simple encryption is very powerful and was used by German Army during >> world war 2. Haven't you heard of Lorenz >> cipher<http://en.wikipedia.org/wiki/Lorenz_cipher>. >> And by the way there is no encryption in world which can't be cracked its >> always the matter of time and knowledge. >> >> Yo! >> Rishabh Sharma >> >> >> >> >> On Thursday, July 19, 2012 12:02:39 PM UTC+5:30, Debasish wrote: >>> >>> Hi Rishabh, >>> It is not a good idea to advice someone to use your own self created >>> algorithm no matter how smart you are, unless the algorithm is published in >>> a renowned journal paper, and tested by every veteran and mathematician in >>> the world upto at least some time, and is accepted by them as a good >>> algorithm. My friend might not break it, you may not break it, but that >>> does not mean no one in the world can. >>> >>> Remember that trying all the permutation might not be required, there >>> may be other ways. The first thing about a good encryption algorithm is to >>> make sure (with established mathematical facts, may be not proven to be so, >>> but also not proven to be wrong for centuries. for example the fact that >>> there is no efficient algorithm to factorize the product of two primes) >>> that the only way to break it is by non-statistical brute forcing. After >>> you have that, its just a matter of choosing large enough values to really >>> make it difficult. >>> >>> On Thu, Jul 19, 2012 at 11:19 AM, Rishabh.rammstien < >>> [email protected]> wrote: >>> >>>> I have given a basic encryption example the same algorithm can be made >>>> more complex. >>>> For Example in my above post i have used 1 byte encryption. >>>> For Encryption you can use n number of bytes where >>>> n=1,2,3,4,5,6,7,8,9........ >>>> higher the value of n more stronger will be the encryption and more >>>> number of permutation combinations hacker need to do to decrypt the file >>>> which seems impossible to me. >>>> >>>> Try my application RCrypto >>>> <http://sourceforge.net/projects/rcrypto/files/RCrypto%20Beta%283.0%29%20%28xp%2Cvista%20%2C7%29.exe/download>(for >>>> windows) it uses 8-byte encryption and just try to break it or ask your >>>> hacker friend to break it. >>>> >>>> >>>> On Wednesday, July 18, 2012 12:16:53 PM UTC+5:30, Debasish wrote: >>>>> >>>>> That's not encryption, any skilled hacker will break it in a few >>>>> minutes. That is why so many people have created such good secure >>>>> algorithms. >>>>> >>>>> On Wed, Jul 18, 2012 at 11:22 AM, Rishabh.rammstien < >>>>> [email protected]> wrote: >>>>> >>>>>> Hi, >>>>>> >>>>>> You can use simple c++ XOR algorithm to encrypt the file. >>>>>> suppose 8 bit password entered by user is 10101010 >>>>>> >>>>>> Encrypt byte :11010010 >>>>>> 11010010 >>>>>> XOR Encrypted Output= 01111000 >>>>>> 10101010 >>>>>> >>>>>> Decrypt byte: 01111000 >>>>>> 01111000 >>>>>> XOR Decrypted Output= 11010010 >>>>>> 10101010 >>>>>> Done >>>>>> >>>>>> Rishabh Sharma >>>>>> Anantya R&D >>>>>> >>>>>> On Tuesday, July 17, 2012 6:38:24 PM UTC+5:30, TeknoCepni wrote: >>>>>>> >>>>>>> Hi, >>>>>>> >>>>>>> I want to encrypt the file then one software decipher this file and >>>>>>> read it. >>>>>>> How can I do it ? >>>>>>> >>>>>>> Programming language : C++ >>>>>>> Ofcourse in Linux. >>>>>>> >>>>>>> >>>>>>> Huseyin Caliskan >>>>>>> >>>>>>> >>>>>>> -- >>>>>> Mailing list guidelines and other related articles: >>>>>> http://lug-iitd.org/Footer >>>>>> >>>>> >>>>> >>>>> >>>>> -- >>>>> Debasish Ray Chawdhuri >>>>> http://www.geekyarticles.com/ >>>>> [A collection of advanced articles on java] >>>>> >>>>> -- >>>> Mailing list guidelines and other related articles: >>>> http://lug-iitd.org/Footer >>>> >>> >>> >>> >>> -- >>> Debasish Ray Chawdhuri >>> http://www.geekyarticles.com/ >>> [A collection of advanced articles on java] >>> >>> -- >> Mailing list guidelines and other related articles: >> http://lug-iitd.org/Footer >> > > > > -- > Debasish Ray Chawdhuri > http://www.geekyarticles.com/ > [A collection of advanced articles on java] > > -- > Mailing list guidelines and other related articles: > http://lug-iitd.org/Footer > -- Mailing list guidelines and other related articles: http://lug-iitd.org/Footer
