473,396 Members | 1,693 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Rijndael Encryption - CAPS Result

http://www.obviex.com/samples/Encryption.aspx

According to this link, I am using Rijndael Encryption & Decryption
Algorithms, But I want my encrypted strings just CAPS string and just
alphanumeric values ABC...Z and 123...90, no other chars I want, what should
I do ? or what other algos I must use,

Thanks
Nov 16 '07 #1
4 4773
Sylvie,

Are you looking for something like base64 encoding?
Encryption/decryption will translate one set of bytes to another set of
bytes.

If you want just an alphanumeric representation of those bytes, you will
have to encode the resulting bytes into base64.

You can use the static ToBase64String method on the Convert class to
convert the byte array to a string which is base64 encoded.
--
- Nicholas Paldino [.NET/C# MVP]
- mv*@spam.guard.caspershouse.com

"Sylvie" <ss*@sss.sswrote in message
news:%2****************@TK2MSFTNGP04.phx.gbl...
http://www.obviex.com/samples/Encryption.aspx

According to this link, I am using Rijndael Encryption & Decryption
Algorithms, But I want my encrypted strings just CAPS string and just
alphanumeric values ABC...Z and 123...90, no other chars I want, what
should I do ? or what other algos I must use,

Thanks

Nov 16 '07 #2
Hi Sylvie,
According to this link, I am using Rijndael Encryption & Decryption
Algorithms, But I want my encrypted strings just CAPS string and just
alphanumeric values ABC...Z and 123...90, no other chars I want, what
should I do ? or what other algos I must use,
since Rijndael and familliar are very strong encryption algorithms and
they work in the managed (and in general) with byte arrays/streams
you can use anything to encrypt, what can be transformed to a byte
array/stream, no matter what the original data was e.g. binary files,
text, images, etc,...it is up to you whatever you want to encrypt or
decrypt.

Depending on the nature of your application and your project
or even your intention you have to decide between speed and
security where i would recommend always security since we today
have a very powerfull range of comupters and e.g. processors
are very powerfull today and there is a lot of memory we are free
to use.

There are less powerfull algorithms for encryption/decryption of
data but if your data s confidential, theres is no reason why you
should use less secure ones!

Here you will find a (small) list of algorithms for cryptographic tasks.
This list is not nearly complete, due to the fact that there are endless
implementations of security out there in the world. Even i wrote some
cryptographic algos for special areas of security and they are VERY
different from other common implementations:

http://en.wikipedia.org/wiki/List_of...hic_algorithms
Cheers,...

Kerem

---------
New Open Source Tools from me:
Calculate MD5 or SHA1 Hash for Files!
KHash Tools 1.0 Englisch:
http://download.chip.eu/de/KHash-Tools-1.0_1317168.html
---------

Beste Grüsse / Best regards / Votre bien devoue

Kerem Gümrükcü
ke*****@arcor.de

Best Quote: "Ain't nobody a badass with a double dose
of rock salt...", Kill Bill Vol.2

Latest Open-Source Projects: http://entwicklung.junetz.de
Sign my guestbook: http://entwicklung.junetz.de/guestbook/

-----------------------
"This reply is provided as is, without warranty express or implied."
Nov 16 '07 #3
On Fri, 16 Nov 2007 16:04:06 +0200, "Sylvie" <ss*@sss.sswrote:
>http://www.obviex.com/samples/Encryption.aspx

According to this link, I am using Rijndael Encryption & Decryption
Algorithms, But I want my encrypted strings just CAPS string and just
alphanumeric values ABC...Z and 123...90, no other chars I want, what should
I do ? or what other algos I must use,

Thanks
Using Rijndael will give you output of effectively random bytes - that
is one of the properties of a secure cypher. You have two options: a)
convert the output into a different format using a restricted
character set. b) Use a less secure encryption mechanism that only
produces a restricted character set.

For a) you can use Base64: 'a'-'z', 'A'-'Z', '0'-'9', '+', '/', '=' or
Base32: 'A'-'Z', '2'-'7', '='. If you want a very restricted
character set, just use Hex (= Base16): '0'-'9', 'A'-'F'.

For details see RFC 3548: http://www.faqs.org/rfcs/rfc3548.html

Option b) is less secure - google "Vigenere" for some examples. Be
aware that Vigenere cyphers are broken and less secure than Rijndael.
They are fine for keeping secrets from your kid sister, but not for
anything serious. I would suggest option a).

rossum

Nov 16 '07 #4
Hi rossum,
They are fine for keeping secrets from your kid sister, but not for
anything serious. I would suggest option a).
my sister is a exception. She is a mathematican and her areas of
work are number theory and cryptography. She helped me a lot
in security and math, even i am not that bad in that scope,...

Her favorite phrase: "You just need time and computing power, rest
is up to your algorithmical imagination..."

Cheers,...

Kerem

---------
New Open Source Tools from me:
Calculate MD5 or SHA1 Hash for Files!
KHash Tools 1.0 Englisch:
http://download.chip.eu/de/KHash-Tools-1.0_1317168.html
http://entwicklung.junetz.de/project...ls%20v.1.0.zip
---------

Beste Grüsse / Best regards / Votre bien devoue

Kerem Gümrükcü
ke*****@arcor.de

Best Quote: "Ain't nobody a badass with a double dose
of rock salt...", Kill Bill Vol.2

Latest Open-Source Projects: http://entwicklung.junetz.de
Sign my guestbook: http://entwicklung.junetz.de/guestbook/

-----------------------
"This reply is provided as is, without warranty express or implied."
Nov 16 '07 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: Mantorok | last post by:
Hi I have a couple of encryption methods but when I call decrypt I get the string back but with a load \0 escape characters on the end? Any idea why? It is actually causing problems in some...
1
by: news.microsoft.com | last post by:
Hello, how can i create a key for Rijndael from a given password? I have no clue how I must start with this. I've read that the key must always be a fixed size. thanks.
5
by: ~~~ .NET Ed ~~~ | last post by:
Anybody has any idea why this simple thing is not working? I pass a text file as input to encrypt it, then pass the encrypted version to the same function and get some garbled data not at all...
0
by: Jens Müller | last post by:
Hello, I try to program a Rijndael encryption in Windows which has to be compatible with php. In php I use the code below to encrypt with a 256 Bit Key and a 256 Bit block cipher. My windows...
0
by: Vayse | last post by:
I need to encrypt some strings in serveral programs I have. So I grabbed some code from the MS help. I wrote an app that would help me generate the encrypted strings. Its s form with 4 text boxes...
1
by: RJ | last post by:
The 2.0 Framework SDK only has examples where the Rijndael class instance provides the key. I've tried setting my own key value, making sure my key length matches the KeySize property of my...
10
by: Iwan Budihalim | last post by:
Who can help? I'm trying to implement an encrypted (plain text) communication between a Delphi application and an ASP.NET. My choice is AES/rijndael-128. For both sides, i use standard modules: ...
4
by: Fritjolf | last post by:
Hi. I've got a strange problem... I've made a simple program to test encryption/decryption. I use Rijndael encryption and here are the most important properties. RijndaelManaged cipher =...
3
by: KBS Developer | last post by:
Hi, I can encrypt without any problem but while decrypting I got junk. I've read the other thread about getting junk but that is not my case. Here is the sample code: private Rijndael...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.