473,404 Members | 2,195 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,404 software developers and data experts.

Save and load crypted XML

Hi

I need to save / load XML data in crypted format.
I'm using .net 1.1.

Thanks.

Sep 14 '07 #1
3 2540
"nano2k" <ad***********@ikonsoft.rowrote in message
news:11**********************@d55g2000hsg.googlegr oups.com...
Hi

I need to save / load XML data in crypted format.
I'm using .net 1.1.

Thanks.
What you really need is a specification.

Decide how you are going to encrypt, and equalising both sides of the
equation on transposition; how you are going to decrypt. These steps
pre-empt input and output, and no, generic methods are not secure because
they are anticipated - so anyone with enough computing power can hack the
cryptotext via the method until they get something that makes linguistic
sense (as opposed to progressively cracking the cryptotext directly until a
crib displaying linguistic distribution and structure shows up).

I'll let someone else deal with the XML functionality of .NET and we're not
done with encryption yet.

You have to assume that by encrypting your data, you are not so much as
keeping anyone out but buying time until that data is compromised. So you
need to build masking into your algorithm. Masking is where, depending on
which of a dozen or more keys, the derived plaintext can say one of a dozen
or more different things - all linguistically correct with respect to the
field or context of the material you are encrypting. This way, your
cryptotext can be hacked to no legal avail (which does nothing to stop any
oil-drum holidays if your data is officially sensitive). Masking is also a
great way to put off amateur hackers, although I doubt there are many of
these who are capable of even cracking a simple Caesar Cipher. The issue
here is that if your method becomes known, then some script kiddie with a
password testing program is probably going to stop at the first decoy,
thinking s/he's cracked your code.

How you choose to encrypt and/or mask is your private business. Just
remember to balance both sides of the equation when you do the necessary
transposition. This can involve a lot of mathematics, hard work, and if you
weren't listening in Form 2 (Year 8 of school) it may prove frustrating as
well.

Cryptography requires bug-free algorithms, which is why when done by hand,
the origin resets regularly. As with all software development, a good
testbed is the key to bug-free software and often as not, a good testbed and
a little experimentation can help you find out how to make something you
don't quite understand work anyway.

Good luck...

--
Timothy Casey GPEMC! >11950 is the nu****@fieldcraft.com.au 2email
Terms & conditions apply. See www.fieldcraft.biz/GPEMC
www.fieldcraft.biz & www.speed-reading-comprehension.com
www.geologist-1011.com & www.web-design-1011.com
Sep 16 '07 #2
On 17 Sep, 00:40, "Number 11950 - GPEMC! Replace number with 11950"
<num...@fieldcraft.bizwrote:
"nano2k" <adrian.rot...@ikonsoft.rowrote in message

news:11**********************@d55g2000hsg.googlegr oups.com...
Hi
I need to save / load XML data in crypted format.
I'm using .net 1.1.
Thanks.

What you really need is a specification.

Decide how you are going to encrypt, and equalising both sides of the
equation on transposition; how you are going to decrypt. These steps
pre-empt input and output, and no, generic methods are not secure because
they are anticipated - so anyone with enough computing power can hack the
cryptotext via the method until they get something that makes linguistic
sense (as opposed to progressively cracking the cryptotext directly until a
crib displaying linguistic distribution and structure shows up).

I'll let someone else deal with the XML functionality of .NET and we're not
done with encryption yet.

You have to assume that by encrypting your data, you are not so much as
keeping anyone out but buying time until that data is compromised. So you
need to build masking into your algorithm. Masking is where, depending on
which of a dozen or more keys, the derived plaintext can say one of a dozen
or more different things - all linguistically correct with respect to the
field or context of the material you are encrypting. This way, your
cryptotext can be hacked to no legal avail (which does nothing to stop any
oil-drum holidays if your data is officially sensitive). Masking is also a
great way to put off amateur hackers, although I doubt there are many of
these who are capable of even cracking a simple Caesar Cipher. The issue
here is that if your method becomes known, then some script kiddie with a
password testing program is probably going to stop at the first decoy,
thinking s/he's cracked your code.

How you choose to encrypt and/or mask is your private business. Just
remember to balance both sides of the equation when you do the necessary
transposition. This can involve a lot of mathematics, hard work, and if you
weren't listening in Form 2 (Year 8 of school) it may prove frustrating as
well.

Cryptography requires bug-free algorithms, which is why when done by hand,
the origin resets regularly. As with all software development, a good
testbed is the key to bug-free software and often as not, a good testbed and
a little experimentation can help you find out how to make something you
don't quite understand work anyway.

Good luck...

--
Timothy Casey GPEMC! >11950 is the num...@fieldcraft.com.au 2email
Terms & conditions apply. Seewww.fieldcraft.biz/GPEMCwww.fieldcraft.biz&http://www.speed-reading-comprehensi...esign-1011.com
Hi, thanks for your response.
I'm not trying to encrypt money transaction information, I'm trying to
cache something on client side of a client/server app. It's some
general data, but I decided to keep it out from the eyes of a simple
pc user, not from the eyes of a hacker. I'm not really trying to
secure data, but all I want is to prevent the user from changing
(accidentally or not) cached data. If data is changed, new data
should be retrieved from the server..
The data is kept in memory in XML format. When the user closes the
client application, I want to save the data, so it'll be used next
time the app is started. I also need to make sure that the data was
not changed betweens work sessions, so I thought that encrypting the
file should do the trick without the need to store "somewhere"
additional data, like CRC of file, etc.
If something is changed, the file decoding would fail, so I should
require new data from server.

Sep 17 '07 #3
"nano2k" <ad***********@ikonsoft.rowrote in message
news:11**********************@r29g2000hsg.googlegr oups.com...
[SNIP]
>
Hi, thanks for your response.
I'm not trying to encrypt money transaction information, I'm trying to
cache something on client side of a client/server app. It's some
general data, but I decided to keep it out from the eyes of a simple
pc user, not from the eyes of a hacker. I'm not really trying to
secure data, but all I want is to prevent the user from changing
(accidentally or not) cached data. If data is changed, new data
should be retrieved from the server..
The data is kept in memory in XML format. When the user closes the
client application, I want to save the data, so it'll be used next
time the app is started. I also need to make sure that the data was
not changed betweens work sessions, so I thought that encrypting the
file should do the trick without the need to store "somewhere"
additional data, like CRC of file, etc.
If something is changed, the file decoding would fail, so I should
require new data from server.
Just a simple polar spin should do the trick, although non-hackers are put
off by binary so when you write your XML string, just read & write to file
as binary...

Good luck...

--
Timothy Casey GPEMC! >11950 is the nu****@fieldcraft.com.au 2email
Terms & conditions apply. See www.fieldcraft.biz/GPEMC
www.fieldcraft.biz & www.speed-reading-comprehension.com
www.geologist-1011.com & www.web-design-1011.com
Sep 18 '07 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: Andras Gilicz | last post by:
Hi VB fans I'm working on a relatively large project in VB6 with about a dozen forms, including graphs, labels, text boxes, etc. The software itself is actually a flow simulator with more or...
2
by: Tom Pearson | last post by:
I have created an XmlDocument and can see that this is correctly formed and has a root element If I Save the doc to a file and reload it all works o If I dump the doc to a stream, again using the...
1
by: DraguVaso | last post by:
Hi, I found some examples for storing the FormSettings of a Form in an XML-file, but none of these could match my criteria: What I am looking for is the possibility to save the FormSettings of...
4
by: Glenn M | last post by:
I have a shared XML file on a server . i also have one xslt file that performs a simple transform on in to view the data. now i want to have another page that lets users modify the shared xml...
3
by: Stefano | last post by:
I've a form windows with a lot of textbox controls. How can I do if I have to save all text proprety of this controls in an external file, to reload them in future?
1
by: Irene | last post by:
Hello all! I'm creating a web site in ASP.NET (VB.NET). One of the requirements was to allow users to create orders going through several steps. A must have is to have an option to save the work...
1
by: liuliuliu | last post by:
hi -- sorry if this is trivial -- but how do you make a screenshot of a pygame display? i have a surface which is basically the entire visible screen -- how do you write this surface as an image...
0
by: Andrea | last post by:
Hi, I've a problem reading a field containing a crypted string. I read the field via JDBC but when I decrypt the string I obtain a sequence of strange characters (if I output them I obtain a...
10
by: Marren02 | last post by:
Hi, I recently just unsubscribed my other thread due to the fact that it went against the posting regulations... If you feel offended by what I posted, I apologize I need Code for a save...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.