Re: FOG algorithm

2010-09-28 Thread Thomas Mueller
Hi, The FOG algorithm is only used if it specified in the database URL. If you don't use CIPHER=FOG in the database URL then it is not used. Regards, Thomas -- You received this message because you are subscribed to the Google Groups "H2 Database" group. To post to this group, send email to h2

Re: FOG algorithm

2010-09-26 Thread Thotheolh
Hi Thomas. I used version 1.2.143 to open a database created using 1.2.137. Versions like 1.2.137 are non-FOG since they don't contain the FOG security feature. Good to note that non-FOG versions could still be accessed. I used the 1.2.143 version to create a database and populate it as I have do

Re: FOG algorithm

2010-08-28 Thread Thomas Mueller
Hi, > We also can suggest Thomas to use ROT13. This is even more faster... Yes, but the data doesn't look as random as with FOG. Regards, Thomas -- You received this message because you are subscribed to the Google Groups "H2 Database" group. To post to this group, send email to h2-datab...@g

Re: FOG algorithm

2010-08-26 Thread B M
On Thu, Aug 26, 2010 at 1:33 PM, Thotheolh wrote: > Hi. It's good to know that FOG is a faster and AES and XTEA but it's > apparent insecurity is still insecurity. > > It's the same as hiding the house key under the door mat and the > concept of using 'unauthorized decryption is illegal' would not

Re: FOG algorithm

2010-08-25 Thread Rami Ojares
> It's the same as hiding the house key under the door mat I think everybody understands it's limitations. However I have many a times hidden my key under the door mat with very good results. Had I lived in the nest of thieves my strategy would have failed. But since I lived in a bourgeois nei

Re: FOG algorithm

2010-08-25 Thread Thotheolh
Hi. It's good to know that FOG is a faster and AES and XTEA but it's apparent insecurity is still insecurity. It's the same as hiding the house key under the door mat and the concept of using 'unauthorized decryption is illegal' would not have much impacts because even up till now, there are still

Re: FOG algorithm

2010-08-24 Thread Thomas Mueller
Hi, > My personal opinion is that rather then hiding data using a > cryptographically weak algorithm, why not use something like XTEA > which is already in-built and is fast, small and is fairly strong > cryptographically ? Originally, the main reason to support XTEA was speed. But I found out th