473,397 Members | 1,961 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,397 software developers and data experts.

Encryption Provider with PUBLIC decryptor and PRIVATE encryptor?

I have a need to encrypt information with a private key and decrypt it
with a public key. As odd as that sounds, that's what I need. I need
to make sure the public can't duplicate the encryption. Is there an
asynchronous encryption provider that does just this? I tried RSA, but
it does the opposite.

Any advice/help is greatly appreciated!

Thanks,
Ben

Nov 17 '05 #1
1 1783
Are you persisting the private key or generating it on a session basis?

If you create a new public/private key pair each program session, and your
program doesn't provide any interface for encrypting on the end where you
want to not encrypt, wouldn't you accomplish what you want RSA?

I am making an assumption here, since you haven't provided much information,
but it looks as though you're concerned about spoofing by the person who
decrypts your data; for example, encrypting a modified document and passing
it to others. If that is the case, sign the message as well as encrypt it
and then they could create a new encrypted message but could not reproduce
the signature.

HTH

Dale Preston
MCAD, MCDBA, MCSE
"blesh" <be*@slickcode.com> wrote in message
news:11**********************@g14g2000cwa.googlegr oups.com...
I have a need to encrypt information with a private key and decrypt it
with a public key. As odd as that sounds, that's what I need. I need
to make sure the public can't duplicate the encryption. Is there an
asynchronous encryption provider that does just this? I tried RSA, but
it does the opposite.

Any advice/help is greatly appreciated!

Thanks,
Ben

Nov 17 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: David | last post by:
Hope someone can help or have a free control. I am going to be passing data from a client computer to a server via a winsock control. I want to encrypt/decript the contents of the string that is...
0
by: crawlerxp | last post by:
This is the problem: I do not get the output I need when encoding and decoding data using rijndael alghoritm. Look at the code and see what the problem is actually: Please paste this code into...
0
by: crawlerxp | last post by:
This is the problem: I do not get the output I need when encoding and decoding data using rijndael alghoritm. Look at the code and see what the problem is actually: Please paste this code into...
3
by: Jimski | last post by:
Hello all, I am having a problem where I get an error message when I call FlushFinalBlock when decrypting my encrypted text. I am using the Rijndael algorithm. The error message is "Length...
5
by: Robert Bull | last post by:
I am looking for an example of encryption/decryption in asp.net. I want to encrypt a string before I send it to a Web Service, decrypt it on the Web Service then encrypt the results on the Web...
6
by: larry mckay | last post by:
Hi, Does anyone have any simple text string encryption routines that are easy to implement? I'm trying to prevent users and system administrators from figuring out how I implement things....
2
by: almurph | last post by:
Hi everyone, Can you help me please? I am having a problem with the encryption/decryption of words with the Irish fada in them. The Irish fada is like this: αινσϊ/ΑΙΝΣΪ. It's kind of like the...
4
by: news.microsoft.com | last post by:
Hello, I've read the example on RijndaelManaged Encryption. (see below) What I don't understand is the generation of the Key (GenerateKey) and the IV value (GenerateIV). It's generated on...
0
by: Vayse | last post by:
I need to encrypt some strings in serveral programs I have. So I grabbed some code from the MS help. I wrote an app that would help me generate the encrypted strings. Its s form with 4 text boxes...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.