hello all
i need a code for RSA algorithm written in c lang. that takes a file contents and encrypts it..then put the encrypted data in a new file...the decryption operation must be the inverse..
need help please.
If you're a beginning, the RSA algorithm might not be the best starting position to learn from ;) Typically code postings for this algorithm on other parts of the Internet may have explicit C language nuances, for optimization purposes, you may get lost unless you have a solid understanding of C.
However, I am a believe in being "thrown in at the deep end", give some attention on Google for searching for "RSA Pseudocode" if you're learning, implementing pseudocode is a good exercise, helping you to understand how the algorithm works as well as the C language itself.
7 2533
We don't do code for people here, certainly not for free. We can help you if you have problems with your code.
r035198x thanks a lot for reply...but i know that you don't do code for people here but what i was looking for is just a link to a free code because i searched and found many codes but i believe that it is not efficient enough and does not satisfy my purpose..
i know that i will never find a code that does exactly what i want but at least something around my idea..
so any help would be appreciated..
We don't find links to code either... we are here to help you learn, not give stuff to you.
ok Rabbit..thanks for making things clearer..generally i did write a code and it works pretty good..but i'm still a beginner so if i face any problem be ready to help me learn ok!!!
thanks again...
No problem, we are glad to help those who want to learn.
If you're a beginning, the RSA algorithm might not be the best starting position to learn from ;) Typically code postings for this algorithm on other parts of the Internet may have explicit C language nuances, for optimization purposes, you may get lost unless you have a solid understanding of C.
However, I am a believe in being "thrown in at the deep end", give some attention on Google for searching for "RSA Pseudocode" if you're learning, implementing pseudocode is a good exercise, helping you to understand how the algorithm works as well as the C language itself.
moosedude thank you very much for the precious advice...
i will consider it carefully...
Sign in to post your reply or Sign up for a free account.
Similar topics
by: Tzu-Chien Chiu |
last post by:
Hi,
"What methods do you ever use to optimize the programs?"
We're developing a graphics chip emulator in C++, but it's very slow
for big scenes. Even though this is a cross-platform software,...
|
by: bpontius |
last post by:
The GES Algorithm
A Surprisingly Simple Algorithm for Parallel Pattern Matching
"Partially because the best algorithms presented in the literature
are difficult to understand and to implement,...
|
by: Skybuck Flying |
last post by:
Hi,
if (__builtin_expect (!buffer->__init, 0))
{
buffer->__a = 0x5deece66dull;
buffer->__c = 0xb;
buffer->__init = 1;
}
I am using visual c 6 and this code doesn't compile, it's probably...
|
by: Bonj |
last post by:
I was in need of an encryption algorithm to the following requirements:
1) Must be capable of encrypting strings to a byte array, and decyrpting
back again to the same string
2) Must have the same...
|
by: Bayazee |
last post by:
hi
can we hide a python code ?
if i want to write a commercial software can i hide my source code from
users access ?
we can conver it to pyc but this file can decompiled ... so ...!!
do you...
|
by: Julio C. Hernandez Castro |
last post by:
Dear all,
We have just developped a new block cipher called Raiden, following a
Feistel Network structure by means of genetic programming. Our
intention now consists on getting as much feedback...
|
by: sofeng |
last post by:
I'm not sure if "data hiding" is the correct term, but I'm trying to
emulate this object-oriented technique. I know C++ probably provides
much more than my example, but I'd just like some feedback...
|
by: prometheuzz |
last post by:
Hello (Java) enthusiasts,
In this article I’d like to tell you a little bit about graphs and how you can
search a graph using the BFS (breadth first search) algorithm.
I’ll address, and...
|
by: mfareed |
last post by:
Can somebody help me with the CRC (Cyclic Redundancy Code) algorithm implementation given below:
There is a three byte packet header.
<--------1st byte-----><--------2nd...
|
by: Rabbit |
last post by:
Introduction
The Advanced Encryption Standard is the algorithm that won the National Insitute of Standards and Technology's (NIST) search for a standardized encryption algorithm in 2001. In 2002, it...
|
by: CloudSolutions |
last post by:
Introduction:
For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
|
by: Faith0G |
last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome former...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
| |