Thanks everyone ...

On 19 July 2012 14:20, Debasish Ray Chawdhuri <
[email protected]> wrote:

> OK you can go ahead. I would not be interested in some technology people
> used to have in the stone age. And World War 2 is stone age in the context
> of computation.
>
> On Thu, Jul 19, 2012 at 3:56 PM, Rishabh.rammstien 
> <[email protected]>wrote:
>
>> hi Debasish,
>>
>> As i have already said its simple algorithm to encrypt bytes. But brother
>> this simple encryption is very powerful and was used by German Army during
>> world war 2. Haven't you  heard of Lorenz 
>> cipher<http://en.wikipedia.org/wiki/Lorenz_cipher>.
>> And by the way there is no encryption in world which can't be cracked its
>> always the matter of time and knowledge.
>>
>> Yo!
>> Rishabh Sharma
>>
>>
>>
>>
>> On Thursday, July 19, 2012 12:02:39 PM UTC+5:30, Debasish wrote:
>>>
>>> Hi Rishabh,
>>> It is not a good idea to advice someone to use your own self created
>>> algorithm no matter how smart you are, unless the algorithm is published in
>>> a renowned journal paper, and tested by every veteran and mathematician in
>>> the world upto at least some time, and is accepted by them as a good
>>> algorithm. My friend might not break it, you may not break it, but that
>>> does not mean no one in the world can.
>>>
>>> Remember that trying all the permutation might not be required, there
>>> may be other ways. The first thing about a good encryption algorithm is to
>>> make sure (with established mathematical facts, may be not proven to be so,
>>> but also not proven to be wrong for centuries. for example the fact that
>>> there is no efficient algorithm to factorize the product of two primes)
>>> that the only way to break it is by non-statistical brute forcing. After
>>> you have that, its just a matter of choosing large enough values to really
>>> make it difficult.
>>>
>>> On Thu, Jul 19, 2012 at 11:19 AM, Rishabh.rammstien <
>>> [email protected]> wrote:
>>>
>>>> I have given a basic encryption example the same algorithm can be made
>>>> more complex.
>>>> For Example in my above post i have used 1 byte encryption.
>>>> For Encryption you can use n number of bytes where
>>>> n=1,2,3,4,5,6,7,8,9........
>>>> higher the value of n more stronger will be the encryption and more
>>>> number of permutation combinations hacker need to do to decrypt the file
>>>> which seems impossible to me.
>>>>
>>>> Try my application RCrypto
>>>> <http://sourceforge.net/projects/rcrypto/files/RCrypto%20Beta%283.0%29%20%28xp%2Cvista%20%2C7%29.exe/download>(for
>>>> windows) it uses 8-byte encryption and just try to break it or ask your
>>>> hacker friend to break it.
>>>>
>>>>
>>>> On Wednesday, July 18, 2012 12:16:53 PM UTC+5:30, Debasish wrote:
>>>>>
>>>>> That's not encryption, any skilled hacker will break it in a few
>>>>> minutes. That is why so many people have created such good secure
>>>>> algorithms.
>>>>>
>>>>> On Wed, Jul 18, 2012 at 11:22 AM, Rishabh.rammstien <
>>>>> [email protected]> wrote:
>>>>>
>>>>>> Hi,
>>>>>>
>>>>>> You can use simple c++ XOR algorithm to  encrypt the file.
>>>>>> suppose 8 bit password entered by user is 10101010
>>>>>>
>>>>>> Encrypt byte :11010010
>>>>>> 11010010
>>>>>>    XOR         Encrypted Output= 01111000
>>>>>> 10101010
>>>>>>
>>>>>> Decrypt byte: 01111000
>>>>>> 01111000
>>>>>>     XOR         Decrypted Output= 11010010
>>>>>> 10101010
>>>>>> Done
>>>>>>
>>>>>> Rishabh Sharma
>>>>>> Anantya R&D
>>>>>>
>>>>>> On Tuesday, July 17, 2012 6:38:24 PM UTC+5:30, TeknoCepni wrote:
>>>>>>>
>>>>>>> Hi,
>>>>>>>
>>>>>>> I want to encrypt the file then one software decipher this file and
>>>>>>> read it.
>>>>>>> How can I do it ?
>>>>>>>
>>>>>>> Programming language : C++
>>>>>>> Ofcourse in Linux.
>>>>>>>
>>>>>>>
>>>>>>> Huseyin Caliskan
>>>>>>>
>>>>>>>
>>>>>>>  --
>>>>>> Mailing list guidelines and other related articles:
>>>>>> http://lug-iitd.org/Footer
>>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Debasish Ray Chawdhuri
>>>>> http://www.geekyarticles.com/
>>>>> [A collection of advanced articles on java]
>>>>>
>>>>>  --
>>>> Mailing list guidelines and other related articles:
>>>> http://lug-iitd.org/Footer
>>>>
>>>
>>>
>>>
>>> --
>>> Debasish Ray Chawdhuri
>>> http://www.geekyarticles.com/
>>> [A collection of advanced articles on java]
>>>
>>>  --
>> Mailing list guidelines and other related articles:
>> http://lug-iitd.org/Footer
>>
>
>
>
> --
> Debasish Ray Chawdhuri
> http://www.geekyarticles.com/
> [A collection of advanced articles on java]
>
>  --
> Mailing list guidelines and other related articles:
> http://lug-iitd.org/Footer
>

-- 
Mailing list guidelines and other related articles: http://lug-iitd.org/Footer

Reply via email to