473,403 Members | 2,183 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,403 software developers and data experts.

VBA AES256 Cipher for Strings ONLY - Base 64 output???

Hi all,

I know that user Rabbit made an AES256 alg here:
https://bytes.com/topic/access/insights/906850-aes-encryption-algorithm-vba-vbscript

There's an inquiry on here from a guy who requested a version of the CBC code in that link for use with plain text strings. Encrypting/decryptin. But nothing ever came of it.

There's not a chance under the sun i'm modifying that code to take a string. Too many loops for me to follow whats actually going on. It should've been written to take a byte array in the first place, rather than a file path. I digress.

Can anyone help me find an AES256 Cipher for strings in VBA? Encrypt/Decrypt. It will be used with Access in "short text" / "long text" field types, so output has to be Base64, i'm guessing.

-Thanks!!!

------------------------------------------

Additional info:
I've used the RC4 and XORC examples that are all over the web. They seem weak and they also don't output Base64 which causes issues with querying the encrypted values, etc. An encryption function that is 20 lines doesn't seem all that convincing its secure....
May 24 '20 #1
0 2817

Sign in to post your reply or Sign up for a free account.

Similar topics

6
by: olli | last post by:
Hi, Is there an inverse function of int(s, base) where base can be any number up to 36? I've searched the library reference up and down, but haven't found anything. For example, I need to...
6
by: Buck Rogers | last post by:
Hi guys, newbie here. I am trying to write a program which counts the number of characters in two strings, then prints the number, and states which string is longer. For some reason, my...
2
by: Julio C. Hernandez Castro | last post by:
Dear all, We have just developped a new block cipher called Raiden, following a Feistel Network structure by means of genetic programming. Our intention now consists on getting as much feedback...
1
by: ahoway | last post by:
I am working on a program where I have to enter a decimal number and enter a base and it converts according to base. output: Please enter a decimal number to convert: 15 <-input What base would...
5
by: mirandacascade | last post by:
Attempting to determine whether the PyCrypto package has the capability to perform AES256 encryption. I received the following C# snippet: CryptoProvider provider = new CryptoProvider();...
11
by: jyck91 | last post by:
// Base Conversion // Aim: This program is to convert an inputted number // from base M into base N. Display the converted // number in base N. #include <stdio.h> #include <stdlib.h>...
1
by: shellcity | last post by:
PARSING MATCHING using Strings /------------------------------------------------------------------/ Sample Output 1: Sample Output 2: Enter a String: ( ) Enter a String: ( ( ) )( )...
2
by: Jeremy S. | last post by:
Using .NET 3.5.I need to build a collection of strings given the following input (presented in the app as a DataTable): NodeID --- ParentNodeID --- CultureName --- NodeText 1 --- 2 ---...
2
by: Jimmy45 | last post by:
Hello, I am trying to convert a string into list of strings. The output is like the following: , , ]. However, the output must be like: My code is like the following:
1
by: Ryan Hedderly | last post by:
I have written a function to output a certain number of words per line that is read in from an input file, then the user enters a number of words per line. For some reason the program does not always...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.