473,395 Members | 1,689 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

private key crypto on form post data

Hello,

I need to find a way to encode a form post element with a private key, which
then can be decoded using that same private key using ASP. Yeah, Yeah, I
know strange request. Is there some object on my IIS 6 server or some
object in the Win2000 OS that would allow me to pass in data and a key and
get back the encoded data as well as being able to pass in the encoded data
with the key and get back decoded data?

Would prefer to use a syntax like
DIM myData, X
myData = ...some routine to get data...
SET X = Server.CreateObject("COMPONENT.CLASS")
DIM enc
enc = X.Encode(myData, myKey)
SET X = Nothing
Response.Write "<INPUT Type=Hidden Name=EncodedStuff Value=" & enc & ">"
Then on form receipt
DIM myEncData, enc
myEncData= Request.Form("EncodedStuff")
SET X = Server.CreateObject("COMPONENT.CLASS")
DIM decoded
decoded= X.Decode(myEncData, myKey)
SET X = Nothing
do stuff with decoded data....
Thank you!
Jul 22 '05 #1
0 899

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Gregory L Priem | last post by:
i have been unable to get any of the classes in the System.Security.Cryptography namespace to work on my w2k machine, so i created a vmware session starting from scratch, to remove any possible...
2
by: Bryan Olson | last post by:
The current Python standard library provides two cryptographic hash functions: MD5 and SHA-1 . The authors of MD5 originally stated: It is conjectured that it is computationally infeasible to...
6
by: Michael Sparks | last post by:
Hi, I suspect this is a bug with AMK's Crypto package from http://www.amk.ca/python/code/crypto , but want to check to see if I'm being dumb before posting a bug report. I'm looking at...
0
by: Cory Baker | last post by:
Hi all! I am trying to encrypt data with C# and decrypt the same data using VC++ 6, both using a password. I believe that I am very close on this one but am currently stuck and am receiving...
6
by: Sahil Malik [MVP] | last post by:
Public Private Key Pairs - How do they work? ----------------------------------------------- I was looking at a presentation recently in which it was suggested that - User 1 Encrypts a message...
0
by: no game | last post by:
Is there a sample code (better in C#) using Crypto API library that encrypt data using public and private key that load from .pfx and .cer file, and encrypt and decrypt data, and sign data? I...
5
by: ~~~ .NET Ed ~~~ | last post by:
Anybody has any idea why this simple thing is not working? I pass a text file as input to encrypt it, then pass the encrypted version to the same function and get some garbled data not at all...
2
by: ucb01 | last post by:
Hi, I am working with Visual Studio 2005 in C#. Using makecert I create a self-signed certificate A with a private key then a certificate B based on A. The first is installed in the...
12
by: Fett | last post by:
I need a crypto package that works on windows with python 2.5. Can anyone suggest one for me? I have been searching for a couple days for a good cryptography package to use for public/private...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.