473,395 Members | 1,761 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Need of encryption in My project.

Parul Bagadia
188 100+
Hello,
I am doing a project in USB OVER IP, which is about sharing a remote USB device
from your workstation, for ex. say two PCs are connected by LAN and a scanner is attached to one PC and user sitting at other workstation can access that scanner ; and all of its functionality.
We will be implementing it in Device Driver, so that it wont have any specifications of OS and it will work between diiferent Operating Systems; such as if one PC is having Windows And other Linux, then also you'll be able to access the remote device. This project is already existing , we have to add layer of encryption in it.
Am not clear about its need. Can someone explain this or suggest the books on it?
Sep 4 '09 #1
6 1852
sicarie
4,677 Expert Mod 4TB
What language are you doing this in?
Sep 6 '09 #2
Parul Bagadia
188 100+
We are using C; I got the answer for this.
In network there will be obviously many PCs, but i want only one to communicate with my device which is connected to server; so that's the reason why we are using encryption.
Sep 9 '09 #3
sicarie
4,677 Expert Mod 4TB
@Parul Bagadia
So you don't need anymore help with this?
Sep 10 '09 #4
Parul Bagadia
188 100+
@sicarie
Hopefully not; if you agree with my point that this is the reason why i need security in my project.:-).. If not; yes i still need help on this.
Oct 14 '09 #5
Parul Bagadia
188 100+
Actually the basic threat i came to know is even if some data packet doesn't belong to the particular PC in network; it can accept it. But i dont know how that will be achieved practiacally... Can someone explain...
I mean every1 must b knowing the process of broadcasting; server sends a message having header; which is checked by all clients n whichever clients needs or say values match with it it accepts the packet... So if some PC deciedes to accept all of them; privacy wont be there; but how do we achieve this practically; so that i can see wether our selected algorithm really blocks this or not.
Oct 15 '09 #6
sicarie
4,677 Expert Mod 4TB
@Parul Bagadia
If you're in a more modern switched network, then you don't need to worry about this thanks to most switches' routing tables. A good sniffer might still be able to pick some traffic up (or a malicious PC accepting all packets), but if it's encrypted, then you should be good.

There are various levels of paranoia you can reach while worrying about something like this - the most paranoid would be to create a small client to be installed on the specific host that requires your application, then it could generate some sort of PGP key on install (assuming it's done by a trusted admin) to register with your 'host' application and require login to start the client, and that would be the basis of the encryption used.

Depending on how you set it up, a different level of security on that could be something like using an SSL connection.

It really depends how paranoid you want to get, and the equipment you're using.
Oct 15 '09 #7

Sign in to post your reply or Sign up for a free account.

Similar topics

4
by: Daniel Orner | last post by:
Hello, I'm working on a project that consists of a Java application on the desktop, and a server with Python CGI code. I'm trying to find an encryption algorithm, which would let me send...
34
by: Blake T. Garretson | last post by:
I want to save some sensitive data (passwords, PIN numbers, etc.) to disk in a secure manner in one of my programs. What is the easiest/best way to accomplish strong file encryption in Python? ...
6
by: Richard | last post by:
I'm looking to do my own basic encryption. I've been tyring to do a concept such as: I pass this function the string, key and number of rounds I want to do the encryption. because im round...
10
by: joshsackett | last post by:
I am starting an encryption project for my database and I'm performing some tests on decryption speed. A lot of my application queries use a LIKE parameter in the WHERE clause. To keep from...
3
by: Robert Vabo | last post by:
I have to make an Encrytion function that works for both VB.NEt and VB 6. I use the System.Security.Cryptography in VB.NET and I want to use the same type of functions in VB6. I USE DPAPI to...
1
by: JJ | last post by:
I have a list of contacts in a webpage and the list is created throught the repeater controls. During ItemDataBound event of the repeater, I encrypt the ID of the contacts. When user double...
8
by: manmit.walia | last post by:
Hello Everyone, Long time ago, I posted a small problem I had about converting a VB6 program to C#. Well with the help with everyone I got it converted. But I overlooked something and don't...
4
by: Sylvie | last post by:
http://www.obviex.com/samples/Encryption.aspx According to this link, I am using Rijndael Encryption & Decryption Algorithms, But I want my encrypted strings just CAPS string and just...
2
by: mike | last post by:
Hi. I need a web programmer to set up interactive features on a static web site. The project needs are described at http://vitalkids.org My email address shows near the top of the page at...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.