473,385 Members | 1,487 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Assymetric Encryption question??

Hello all,

I am a bit confused by the Assym. encrpyption.. Many say that it can only
encrypt like 100bytes or so. If so what good is that? Or does this mean
one should loop through a file encrypting 100byte chunks until it is all
encrypted?

Sort of wanted to create a PGP like program/library for various uses.

Also, I have seen folks use public key encryption for their software--you
purchase the Key and it comes as I suppose a public key string that is read
by the software which must have the private key.

Any suggestions on implementing such a strategy or on how to use ASSYM
encryption on large files?

Thanks,

Shane
Nov 20 '05 #1
3 980
Cor
Hi Shane,

Why don't you look for this yourself
http://msdn.microsoft.com/library/de...yptography.asp

A terific lot of stuff about your question

In the resourcekit is an example for encrypting files.

http://msdn.microsoft.com/vbasic/vbrkit/default.aspx

And if you have problems installing it
http://msdn.microsoft.com/vbasic/vbr...q/#installvdir
I hope this helps?

Cor
I am a bit confused by the Assym. encrpyption.. Many say that it can only
encrypt like 100bytes or so. If so what good is that? Or does this mean
one should loop through a file encrypting 100byte chunks until it is all
encrypted?

Sort of wanted to create a PGP like program/library for various uses.

Also, I have seen folks use public key encryption for their software--you
purchase the Key and it comes as I suppose a public key string that is read by the software which must have the private key.

Any suggestions on implementing such a strategy or on how to use ASSYM
encryption on large files?

Nov 20 '05 #2
will check it out.
I have read a bunch of stuff on it but still don't know how to do what I
want to accomplish.

Will check out these resources and get back to you..
Shane

"Cor" <no*@non.com> wrote in message
news:%2****************@TK2MSFTNGP09.phx.gbl...
Hi Shane,

Why don't you look for this yourself
http://msdn.microsoft.com/library/de...yptography.asp
A terific lot of stuff about your question

In the resourcekit is an example for encrypting files.

http://msdn.microsoft.com/vbasic/vbrkit/default.aspx

And if you have problems installing it
http://msdn.microsoft.com/vbasic/vbr...q/#installvdir
I hope this helps?

Cor
I am a bit confused by the Assym. encrpyption.. Many say that it can only encrypt like 100bytes or so. If so what good is that? Or does this mean one should loop through a file encrypting 100byte chunks until it is all
encrypted?

Sort of wanted to create a PGP like program/library for various uses.

Also, I have seen folks use public key encryption for their software--you purchase the Key and it comes as I suppose a public key string that is

read
by the software which must have the private key.

Any suggestions on implementing such a strategy or on how to use ASSYM
encryption on large files?


Nov 20 '05 #3
sorry without highspeed cant' download 192mb
;(
"Cor" <no*@non.com> wrote in message
news:%2****************@TK2MSFTNGP09.phx.gbl...
Hi Shane,

Why don't you look for this yourself
http://msdn.microsoft.com/library/de...yptography.asp
A terific lot of stuff about your question

In the resourcekit is an example for encrypting files.

http://msdn.microsoft.com/vbasic/vbrkit/default.aspx

And if you have problems installing it
http://msdn.microsoft.com/vbasic/vbr...q/#installvdir
I hope this helps?

Cor
I am a bit confused by the Assym. encrpyption.. Many say that it can only encrypt like 100bytes or so. If so what good is that? Or does this mean one should loop through a file encrypting 100byte chunks until it is all
encrypted?

Sort of wanted to create a PGP like program/library for various uses.

Also, I have seen folks use public key encryption for their software--you purchase the Key and it comes as I suppose a public key string that is

read
by the software which must have the private key.

Any suggestions on implementing such a strategy or on how to use ASSYM
encryption on large files?


Nov 20 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: Harold Crump | last post by:
Greetings, I have a requirement of storing some .xml files on a web server. The files will contain financial information like credit card numbers, so I would like to encrypt them. The files...
34
by: Blake T. Garretson | last post by:
I want to save some sensitive data (passwords, PIN numbers, etc.) to disk in a secure manner in one of my programs. What is the easiest/best way to accomplish strong file encryption in Python? ...
14
by: Ray Cassick \(Home\) | last post by:
Ok, time to ask the question here.. I have been battling over this one for sometime now and just have to ask it. I have created a few classes that I use to act a security keys. These classes get...
4
by: panik | last post by:
Hi, I'm looking for something similar to Encryption. I'd like to generate URL's with a format that avoids visible ID's (e.g. http://thesite/viewlink.aspx?ID=105) Instead, I'd like to generate a...
113
by: Bonj | last post by:
I was in need of an encryption algorithm to the following requirements: 1) Must be capable of encrypting strings to a byte array, and decyrpting back again to the same string 2) Must have the same...
3
by: dmalhotr2001 | last post by:
I was wondering whether anyone ever dealt with encryption that are visa compliant with credit card numbers: On 3.4 of this document...
1
by: =?Utf-8?B?bWljcm9ob2Y=?= | last post by:
Short version: Is there a way to configure (preferably programmatically) the max encryption strength that will be used by the framework when connecting to a particular SSL-protected web service? ...
25
by: eggie5 | last post by:
I have a form where a user can change his password, but I'm confused on how to prevent this from being transmitted in plain text. Well, I know how not to transmit it in plain text - use any type...
19
by: klenwell | last post by:
Another request for comments here. I'd like to accomplish something like the scheme outlined at this page here: http://tinyurl.com/3dtcdr In a nutshell, the form uses javascript to hash...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.