473,288 Members | 1,726 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,288 software developers and data experts.

Help needed in choosing an algorithm for Cryptographic services.

Hi group, recently my employer asked me too implement encryption/
decryption for secure data transfer over internet. Problem is that the
client application is written using C# and the webserver where i need
to store the information is developed using python.

My situation of dilemma is which cryptographic method suits me best
for this purpose.

Help/Suggestions are urgently required

Thank you ,
Abhishek
Jun 27 '08 #1
4 1066
abhishek wrote:
Hi group, recently my employer asked me too implement encryption/
decryption for secure data transfer over internet. Problem is that the
client application is written using C# and the webserver where i need
to store the information is developed using python.

My situation of dilemma is which cryptographic method suits me best
for this purpose.

Help/Suggestions are urgently required

Thank you ,
Abhishek
Languages don't have anything to do with "what is best method". It depends
on your application requirements. If all you want is secure data "transfer"
just use SSL to encrypt the information while being transmitted. If you wish
to have the data "stored encrypted" look into PGP.

-Larry
Jun 27 '08 #2
On Thu, 29 May 2008 20:27:35 -0500, Larry Bates wrote:
abhishek wrote:
>Hi group, recently my employer asked me too implement encryption/
decryption for secure data transfer over internet. Problem is that the
client application is written using C# and the webserver where i need
to store the information is developed using python.

My situation of dilemma is which cryptographic method suits me best
for this purpose.

Help/Suggestions are urgently required
The proper newsgroup for this question is sci.crypt.

Data security is a complex and difficult problem, and you are likely
to fail in the worst possible way: implementing something that is
weak but that you believe to be strong. Some advice: (1) Use
off-the-shelf products like PGP or GPG; don't write your own.
(2) Read Bruce Schneier's Applied Cryptography to get a feeling
for the dimensions of the problem. (3) Start by composing a
clear statement of what you need, avoiding vague terms like
"security". If you don't know where you're going, you can't
tell whether you've arrived.

--
To email me, substitute nowhere->spamcop, invalid->net.
Jun 27 '08 #3
abhishek <gu***************@gmail.comwrites:
Hi group, recently my employer asked me too implement encryption/
decryption for secure data transfer over internet. Problem is that the
client application is written using C# and the webserver where i need
to store the information is developed using python.
Use one of the SSL wrappers. Note that if you're using a recent
Debian distro, make sure to take the latest OpenSSL update since they
had an unbelievably bad screwup that destroyed their versions of
OpenSSL's security for a while. That applies to all Debian based
distros including Ubuntu, but not to non-Debian derivatives such as
Fedora.
Jun 27 '08 #4
[ Peter Pearson <pp******@nowhere.invalid]
On Thu, 29 May 2008 20:27:35 -0500, Larry Bates wrote:
>abhishek wrote:
>>Hi group, recently my employer asked me too implement encryption/
decryption for secure data transfer over internet. Problem is that the
client application is written using C# and the webserver where i need
to store the information is developed using python.

My situation of dilemma is which cryptographic method suits me best
for this purpose.

Help/Suggestions are urgently required
Data security is a complex and difficult problem, and you are likely
to fail in the worst possible way: implementing something that is
weak but that you believe to be strong. Some advice: (1) Use
off-the-shelf products like PGP or GPG; don't write your own.
full ack.
(2) Read Bruce Schneier's Applied Cryptography to get a feeling
for the dimensions of the problem.
While this book is most certainly worth reading, I doubt, that it is
necessary to gain in-depth knowledge of cryptography to make use of it in
your code.

If you transfer data over SSL-connection, you should rely on them being
safe, you don't need to understand the details. You only need to know,
what SSL can protect against, and what it can't protect against.

--
Freedom is always the freedom of dissenters.
(Rosa Luxemburg)
Jun 27 '08 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: aredo3604gif | last post by:
On Sun, 10 Apr 2005 19:46:32 GMT, aredo3604gif@yahoo.com wrote: >The user can dynamically enter and change the rule connection between >objects. The rule is a "<" and so given two objects: >a <...
26
by: Lasse Edsvik | last post by:
Hello I'm trying to build a simple COM+ app in vs.net using C# and i cant register it in component manager..... what more is needed than this: using System; using...
113
by: Bonj | last post by:
I was in need of an encryption algorithm to the following requirements: 1) Must be capable of encrypting strings to a byte array, and decyrpting back again to the same string 2) Must have the same...
1
by: Svein Terje Gaup | last post by:
I have a website running on Windows 2000 Server, that should be able to retrieve data from a datawarehouse on another machine running Windows 2000 Server, SQL Server 2000 and SQL Server 2000...
6
by: thecodemachine | last post by:
Hi, I'm looking for a fast and simple one to one hash function, suitable for longer strings (up to 2048 in length). I'd like keys to be relatively short, I doubt I'd be creating more than 256...
8
by: MuZZy | last post by:
Hi, Why for god sake they change implementation of String.GetHashCode() from ..NET 1 to .NET 2? We were storing some user passwords in hashcode, now we can't upgrade those clients with .NET 2...
17
by: cpptutor2000 | last post by:
Could some C guru please help me? I have a simple piece of code as: #include <stdio.h> #include <stdlib.h> #include <openssl/rand.h> int main(){ unsigned char temp; RAND_bytes(temp, 4);
1
by: =?Utf-8?B?c3VyZmtlaXRo?= | last post by:
A machine running XP Home fails to start the cryptographic service. When attempting to start from the services menu it responds with error 2: the file specified cannot be found. I am unable to...
3
by: TD | last post by:
I found a freeware dll, md5lib.dll, on the web and am trying to use it in Acess 2003. I entered this in a module in the database: Public Declare Function StringMD5 Lib...
2
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 7 Feb 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:30 (7.30PM). In this month's session, the creator of the excellent VBE...
0
by: DolphinDB | last post by:
The formulas of 101 quantitative trading alphas used by WorldQuant were presented in the paper 101 Formulaic Alphas. However, some formulas are complex, leading to challenges in calculation. Take...
0
by: DolphinDB | last post by:
Tired of spending countless mintues downsampling your data? Look no further! In this article, you’ll learn how to efficiently downsample 6.48 billion high-frequency records to 61 million...
0
by: Aftab Ahmad | last post by:
Hello Experts! I have written a code in MS Access for a cmd called "WhatsApp Message" to open WhatsApp using that very code but the problem is that it gives a popup message everytime I clicked on...
0
by: Aftab Ahmad | last post by:
So, I have written a code for a cmd called "Send WhatsApp Message" to open and send WhatsApp messaage. The code is given below. Dim IE As Object Set IE =...
0
by: ryjfgjl | last post by:
ExcelToDatabase: batch import excel into database automatically...
0
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
1
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: ArrayDB | last post by:
The error message I've encountered is; ERROR:root:Error generating model response: exception: access violation writing 0x0000000000005140, which seems to be indicative of an access violation...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.