Technically, yes you could, if the program the end user had could accept the RSA key
that cardcrypt/textcrypt created and you gave them.
Problem is, we haven't actually managed to do this yet - the PGP client on Windows has
the option of importing a legacy RSA key but that key needs to be
PGP talks about Radix64 format, and I always thought
this was the same as Base64. So, I would have thought
it was basically a matter of constructing the
appropriate wrapper (RFC 1991) around the key.
But then, I could be completely wrong :)
Technically, yes you could, if the program the end
I don't know much about encryption ...
If I encrypt something with one of the PertWeb encyption tools
(http://developer.perthweb.com.au/), can another user (assuming the user has
the private key) decrypt the string with software other than a cfx tag? I
mean, is there something I can have people
It would be much easier to do this with ssl certificates. You wouldn't
need commercial certs for this. With IIS, you can generate both a server
and client cert and enrcrypt traffic between them. I am pretty sure that
there is an open source system to do the same on Linux.
Cary Gordon
The
Subject: Re: encryption question
It would be much easier to do this with ssl certificates. You wouldn't
need commercial certs for this. With IIS, you can generate both a server
and client cert and enrcrypt traffic between them. I am pretty sure that
there is an open source system
Think of it this way:
I give you a safe. I give you the plans to the safe. I give
you all the materials that the safe was made out of. Now then, I
Mind you I've always worked this way, assume *anything* and everything
can be unencrypted and viewed with ease. Then code according that
that
hey, i'm the Original Inquirer. heh, kinda like that title. ermm anyways,
like i said, the code turns 4665775886868576 into
hkjsdhk987697834^*^@@@Kj=-018^%13534kljdsa986(*@*(@# dsjfkhk junk.
someone said that someone could get the pattern, but i think it is
impossible, since part of the
hey, i'm the Original Inquirer. heh, kinda like that title. ermm anyways,
like i said, the code turns 4665775886868576 into
hkjsdhk987697834^*^@@@Kj=-018^%13534kljdsa986(*@*(@# dsjfkhk junk.
someone said that someone could get the pattern, but i think it is
impossible, since part of the
Pooh Bear
I used a similar technique in my custom tag cf_cryp that's in the
developer's gallery. I actually use the encrypt() function in CF and
then do various operations to convert characters, shift bits and flip
nibbles. I also added a checksum (also encoded) so I could validate
the
at will?
-Original Message-
From: Pooh Bear [mailto:[EMAIL PROTECTED]]
Sent: July 24, 2001 2:31 PM
To: CF-Talk
Subject: Encryption Question PART 2
hey, i'm the Original Inquirer. heh, kinda like that title. ermm anyways,
like i said, the code turns 4665775886868576 into
hkjsdhk987697834
hey, i'm the Original Inquirer. heh, kinda like that title.
ermm anyways, like i said, the code turns 4665775886868576 into
hkjsdhk987697834^*^@@@Kj=-018^%13534kljdsa986(*@*(@#
dsjfkhk junk. someone said that someone could get the pattern,
but i think it is impossible, since part of the
Pooh,
You may be able to obfuscate your information from most people but anyone with some
time and a decent system will
most likely have a easy go with your algorithm. What you are doing sounds like very
simple encryption scheme and
is rife for frequency analysis which would not be that hard
Bear [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 24, 2001 2:31 PM
To: CF-Talk
Subject: Encryption Question PART 2
hey, i'm the Original Inquirer. heh, kinda like that title. ermm anyways,
like i said, the code turns 4665775886868576 into
hkjsdhk987697834^*^@@@Kj=-018^%13534kljdsa986
You might want to look at this http://jenghis.thirdtier.com/crypto/ which uses Strong
Crypto. This URL is rather
outdated and the lattest version I have written supports all the AES systems as well
as various forms of public key
crypto and exchange.
Its also super fast so its fine for little
,
Alexander Sicular
Chief Technology Architect
Neurological Institute of New York
Columbia University
as867 [at] columbia {dot} edu
-Original Message-
From: Pooh Bear [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 24, 2001 4:31 PM
To: CF-Talk
Subject: Encryption Question PART 2
hey, i'm
hey guys, i sitll dont understand what encryption really is. Is this
encryption?..
I wrote coldfusion code to turn this fake credit card number
2775644756644736 into something like
GGJEJH-()%#^@%HSJDH#**#PQP{}{:LLHSKNCJHDJKSJSHD. I did that by moving
numbers around, changing to ASCII,
hey guys, i sitll dont understand what encryption really is. Is this
encryption?..
I wrote coldfusion code to turn this fake credit card number
2775644756644736 into something like
GGJEJH-()%#^@%HSJDH#**#PQP{}{:LLHSKNCJHDJKSJSHD. I did that by moving
numbers around, changing to
, July 23, 2001 2:39 PM
To: CF-Talk
Subject: RE: encryption question
hey guys, i sitll dont understand what encryption really is. Is this
encryption?..
I wrote coldfusion code to turn this fake credit card number
2775644756644736 into something like
GGJEJH-()%#^@%HSJDH#**#PQP
what's wrong with CFENCRYPT?
It's too damn easy to unencrypt - the encryption method is known...
Philip Arnold
Director
Certified ColdFusion Developer
ASP Multimedia Limited
T: +44 (0)20 8680 1133
Websites for the real world
Message-
From: Philip Arnold - ASP [mailto:[EMAIL PROTECTED]]
Sent: Monday, July 23, 2001 4:14 PM
To: CF-Talk
Subject: RE: encryption question
what's wrong with CFENCRYPT?
It's too damn easy to unencrypt - the encryption method is known...
Philip Arnold
Director
Certified ColdFusion
pardon my ignorance, but isn't the encryption method for ALL publicly
available encryption techniques known?
The style maybe known, but the one used for CFEncrypt isn't particularly
difficult to decrypt - thus if someone can get to your site and knows your
using CF, then they'll try the
Oook.
We'll take it a step further.
There are publicly available CF Tags to decrypt cf encoded pages.
There is C++ Source to decode CF Encrypted pages.
There is Perl scripting to decode CF Encrypted pages.
My little pommeranian can decode cf encrypted pages with a doggie decoder ring and a
few
, 2001 4:37 PM
To: CF-Talk
Subject: RE: encryption question
pardon my ignorance, but isn't the encryption method for ALL publicly
available encryption techniques known?
The style maybe known, but the one used for CFEncrypt isn't particularly
difficult to decrypt - thus if someone can get to your
I need to change my DB (MSSQL7) stored passwords so they are encrypted in
the DB. What are some of the more industrial strength methods of doing
this?
Thanks,Adrian
~~
Structure your ColdFusion code with Fusebox. Get the official book at
decrypting. A BAD encryption
scheme will fall apart. CFENCRYPT is the latter. DON'T ever use it for
encrypting sensitive material (e.g. CC numbers).
-Original Message-
From: Bryan Love [mailto:[EMAIL PROTECTED]]
Sent: July 23, 2001 6:17 PM
To: CF-Talk
Subject: RE: encryption question
ARF!
g
ruff ruff! ArF!
-SpARkY
-Original Message-
From: Bryan Love [mailto:[EMAIL PROTECTED]]
p.s. can your pomeranian really decrypt CF?
~~
Structure your ColdFusion code with Fusebox. Get the official book at
26 matches
Mail list logo