473,883 Members | 1,772 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

SHA256

Sam
Hi,
Where can I find a short and simple example of how to use SHA256
encryption algorithm in vb.net ? I've heard it is possible, but SHA256
doesn't give much result in MSDN...

Thx

Nov 21 '05 #1
8 12195
Sam,

For this kind of encryption is my starting search argument forever on MSDN
"Rijndael".

http://msdn.microsoft.com/library/de...classtopic.asp

(That is the area where I live at the moment).

I hope this helps

Cor
Nov 21 '05 #2
Sam
Cor,
Never heard of this place.. :)))
I was actually going to use SHA512, as I got it working. I found it
pretty straightforward to use it in fact. But maybe you have arguments
strong enough to convince me using this Rijndael algorithm(how the hell
do you pronounce this???) In which way is it better than SHA512 ? The
purpose of my encryption is for Password encryption.

Regards

Cor Ligthert wrote:
Sam,

For this kind of encryption is my starting search argument forever on MSDN
"Rijndael".

http://msdn.microsoft.com/library/de...classtopic.asp

(That is the area where I live at the moment).

I hope this helps

Cor


Nov 21 '05 #3
Sam
Actually after reading a bit more about it, it's not what i want as
Rijndael encrypted password can be decrypted as well using a key. I
don't want to be able to read that password again, and once encrypted
it should remain encrypted.
I'll stick with SHA512 :)

Thx

Nov 21 '05 #4

"Sam" <sa************ **@voila.fr> wrote in message
news:11******** **************@ z14g2000cwz.goo glegroups.com.. .
:
: Hi,
:
: Where can I find a short and simple example of how to use
: SHA256 encryption algorithm in vb.net ? I've heard it is
: possible, but SHA256 doesn't give much result in MSDN...
:
: Thx
I was experimenting with something similar once. I wanted a one-way
encrypted string to store the password in a database. Here is the
function I came up with:
--------------------------------------------
Imports System.Security .Cryptography
Imports System.Text

Protected Shared Function SHA256_Encrypt( Txt As String) As String

Dim sha As New SHA256Managed()
Dim ae As New ASCIIEncoding()
Dim Hash() As Byte = sha.ComputeHash (ae.GetBytes(Tx t))
Dim sb As New StringBuilder(H ash.Length * 2)
Dim ndx As Integer

For ndx = 0 To Hash.Length - 1
sb.Append(Right ("0" & Hex(Hash(ndx)), 2))
Next
Return sb.ToString

End Function
--------------------------------------------

HTH

Ralf
Nov 21 '05 #5
http://msdn.microsoft.com/library/de...classtopic.asp

Hi,
Where can I find a short and simple example of how to use SHA256
encryption algorithm in vb.net ? I've heard it is possible, but SHA256
doesn't give much result in MSDN...

Thx


User submitted from AEWNET (http://www.aewnet.com/)
Nov 21 '05 #6
In message <11************ *********@g43g2 000cwa.googlegr oups.com>, Sam
<sa************ **@voila.fr> writes
Cor,
Never heard of this place.. :)))
I was actually going to use SHA512, as I got it working. I found it
pretty straightforward to use it in fact. But maybe you have arguments
strong enough to convince me using this Rijndael algorithm(how the hell
do you pronounce this???) In which way is it better than SHA512 ? The
purpose of my encryption is for Password encryption.


Rain Dial (or something close).

It is now more commonly know as AES and replaces the DES and Triple DES
algorithms. It is also the new standard by the NSA (so if its strong
enough for the US Government, it should be strong enough for most -
providing you keep your key safe).

--
Andrew D. Newbould E-Mail: ne********@NOSP AMzadsoft.com

ZAD Software Systems Web : www.zadsoft.com
Nov 21 '05 #7
it's not encrypted then -- it's hashed and you should know that it is
(theoretically) possible to have a collision (i.e. something else
generates the same value) -- the odds are low with SHA512, however

Nov 21 '05 #8
On 7 Jun 2005 02:23:44 -0700, "Sam" <sa************ **@voila.fr> wrote:
Actually after reading a bit more about it, it's not what i want as
Rijndael encrypted password can be decrypted as well using a key. I
don't want to be able to read that password again, and once encrypted
it should remain encrypted.
I'll stick with SHA512 :)

Thx

Some confusion here, SHA512 is not encryption but its a hashing algorithm
Blow fish AES DES and Triple DES is an encrytion technique.
--
Liberty ...
-----------------------------------------------------------------
Liberty :Freedom is first earned
li************* @revolutionist. com :by demanding it. It's lost by
http://pages.sbcglobal.net/spiritof76 :forgetting its value.
-----------------------------------------------------------------
Nov 21 '05 #9

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

92
6579
by: Reed L. O'Brien | last post by:
I see rotor was removed for 2.4 and the docs say use an AES module provided separately... Is there a standard module that works alike or an AES module that works alike but with better encryption? cheers, reed
2
3801
by: Bryan Olson | last post by:
The current Python standard library provides two cryptographic hash functions: MD5 and SHA-1 . The authors of MD5 originally stated: It is conjectured that it is computationally infeasible to produce two messages having the same message digest. That conjecture is false, as demonstrated by Wang, Feng, Lai and Yu in 2004 . Just recently, Wang, Yu, and Lin showed a short- cut solution for finding collisions in SHA-1 . Their result
4
6783
by: Ravi Singh (UCSD) | last post by:
Hello all I am trying to compare the SHA 256 algorithm as implemented by Christophe Devine and on using the .NET "SHA256Managed" but they do not give me similar hashes. Here is the Christophes implementation .
4
5564
by: PJones | last post by:
I am looking for the best way to one way encrypt a password for storage in a database using (asp.net / vb.net) basically I need some functions or examples that I can freely use in a commercial project anyone got any good functions or links I can look at ? I was looking at MD5 hash .. the examples I saw confused me as I didn't see a key ? Does MD5 not used a key ?
1
4995
by: mirandacascade | last post by:
I am attempting to implement a process, and I'm pretty sure that a major roadblock is that I do not understand the nomenclature. The specs indicate that the goal is to calculate a message digest using an SHA-256 algorithm. There are 2 examples included with the specs. The label on the 2 examples are: 'HMAC samples'. In both examples, the message on which the digest is to be calculated is (the 33 chars within the quotes): 'This is a...
9
3609
by: Ben | last post by:
Hello, I'll bet this has been asked a million times but I can't seem to find a thread that gives the clear example I need. This PC has MySQL and IIS configured and running. The MySQL database is "myDB" with a table "myUsers" with fields "Username" and "Password". I also have the MySQL ODBC driver loaded with a DSN "dsnMySQL" setup. First question is can someone direct me to a site or provide a sample code for a login page that...
4
2251
by: vcnewbie | last post by:
Hi I'm maintaining a VisualC++ project to increase its security regarding stored passwords. I thought about using SHA256Managed to create a hash for the password when creating a user and when this new user tries to login, a new hash will be created for the given password and compared to the stored hash. I guess this is quite common.
8
3840
by: =?Utf-8?B?Z3JlYXRiYXJyaWVyODY=?= | last post by:
Hi, I'm completely stumped on this but i want to create something that can get the md5 value of an EXE based on the passed in argument and compare it to the specified MD5. I can do the comparison, but i dont know how to get the EXE md5 value. Can someone help? http://www.howforge.com/how-to-calculate-md5-in-c kinda helps, but i am
6
1732
by: Viji nellaiappan | last post by:
How to encrypt and decrypt password in php ? Is there any built-in function for encryption and decryption ? Help me friends..
0
9944
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10757
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10860
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
10420
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9583
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7975
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
7134
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5804
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4620
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.