473,385 Members | 1,673 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

c code for RSA algorithm

14
hello all
i need a code for RSA algorithm written in c lang. that takes a file contents and encrypts it..then put the encrypted data in a new file...the decryption operation must be the inverse..

need help please.
Mar 26 '13 #1

✓ answered by moosedude

If you're a beginning, the RSA algorithm might not be the best starting position to learn from ;) Typically code postings for this algorithm on other parts of the Internet may have explicit C language nuances, for optimization purposes, you may get lost unless you have a solid understanding of C.

However, I am a believe in being "thrown in at the deep end", give some attention on Google for searching for "RSA Pseudocode" if you're learning, implementing pseudocode is a good exercise, helping you to understand how the algorithm works as well as the C language itself.

7 2533
r035198x
13,262 8TB
We don't do code for people here, certainly not for free. We can help you if you have problems with your code.
Mar 26 '13 #2
Nosia
14
r035198x thanks a lot for reply...but i know that you don't do code for people here but what i was looking for is just a link to a free code because i searched and found many codes but i believe that it is not efficient enough and does not satisfy my purpose..
i know that i will never find a code that does exactly what i want but at least something around my idea..
so any help would be appreciated..
Mar 27 '13 #3
Rabbit
12,516 Expert Mod 8TB
We don't find links to code either... we are here to help you learn, not give stuff to you.
Mar 27 '13 #4
Nosia
14
ok Rabbit..thanks for making things clearer..generally i did write a code and it works pretty good..but i'm still a beginner so if i face any problem be ready to help me learn ok!!!
thanks again...
Mar 28 '13 #5
Rabbit
12,516 Expert Mod 8TB
No problem, we are glad to help those who want to learn.
Mar 28 '13 #6
If you're a beginning, the RSA algorithm might not be the best starting position to learn from ;) Typically code postings for this algorithm on other parts of the Internet may have explicit C language nuances, for optimization purposes, you may get lost unless you have a solid understanding of C.

However, I am a believe in being "thrown in at the deep end", give some attention on Google for searching for "RSA Pseudocode" if you're learning, implementing pseudocode is a good exercise, helping you to understand how the algorithm works as well as the C language itself.
Mar 28 '13 #7
Nosia
14
moosedude thank you very much for the precious advice...
i will consider it carefully...
Mar 31 '13 #8

Sign in to post your reply or Sign up for a free account.

Similar topics

9
by: Tzu-Chien Chiu | last post by:
Hi, "What methods do you ever use to optimize the programs?" We're developing a graphics chip emulator in C++, but it's very slow for big scenes. Even though this is a cross-platform software,...
10
by: bpontius | last post by:
The GES Algorithm A Surprisingly Simple Algorithm for Parallel Pattern Matching "Partially because the best algorithms presented in the literature are difficult to understand and to implement,...
7
by: Skybuck Flying | last post by:
Hi, if (__builtin_expect (!buffer->__init, 0)) { buffer->__a = 0x5deece66dull; buffer->__c = 0xb; buffer->__init = 1; } I am using visual c 6 and this code doesn't compile, it's probably...
113
by: Bonj | last post by:
I was in need of an encryption algorithm to the following requirements: 1) Must be capable of encrypting strings to a byte array, and decyrpting back again to the same string 2) Must have the same...
64
by: Bayazee | last post by:
hi can we hide a python code ? if i want to write a commercial software can i hide my source code from users access ? we can conver it to pyc but this file can decompiled ... so ...!! do you...
2
by: Julio C. Hernandez Castro | last post by:
Dear all, We have just developped a new block cipher called Raiden, following a Feistel Network structure by means of genetic programming. Our intention now consists on getting as much feedback...
11
by: sofeng | last post by:
I'm not sure if "data hiding" is the correct term, but I'm trying to emulate this object-oriented technique. I know C++ probably provides much more than my example, but I'd just like some feedback...
4
prometheuzz
by: prometheuzz | last post by:
Hello (Java) enthusiasts, In this article I’d like to tell you a little bit about graphs and how you can search a graph using the BFS (breadth first search) algorithm. I’ll address, and...
3
by: mfareed | last post by:
Can somebody help me with the CRC (Cyclic Redundancy Code) algorithm implementation given below: There is a three byte packet header. <--------1st byte-----><--------2nd...
9
Rabbit
by: Rabbit | last post by:
Introduction The Advanced Encryption Standard is the algorithm that won the National Insitute of Standards and Technology's (NIST) search for a standardized encryption algorithm in 2001. In 2002, it...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.