473,224 Members | 1,540 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,224 software developers and data experts.

Algorithms: verhoeff, base64, alleged RC4. in VBA (excel)

2 2Bits
Excuse me, I speak Spanish. I am self-taught in computer science and I ventured to make a payment system for my small shop. the problem is; that for my billing system to work the algorithms are missing: presumed rc4, verhoeff and base64, in VBA language, I don't understand this and I wanted to ask if you had any of this among your algorithms that you could share with me, I am very grateful.

The algorithms must satisfy the result of the following examples:

'*******input data
Authorization: maximum fifteen digits (numbers).
Invoice: maximum twelve digits (numbers).
DNI: minimum value = zero (one digit), maximum twelve digits (numbers).
Date: YYYYMMDD, eight digits (numbers).
Cost: minimum value = 1, no maximum value (rounded number).
Password: up to 256 characters.
A, B, C, D, E, F, G, H, I, J, K, L, M, N, P, Q, R, S, T, U, V, W, X, Y, Z,
a, b, c, d, e, f, g, h, i, j, k, m, n, p, q, r, s, t, u, v, w, x, y, z, 2,
3, 4, 5, 6, 7, 8, 9, =, #, (, ), *, +, -, _, \, @, [, ], {, }, %, $

Algorithms: verhoeff, base64, alleged RC4

Control code: generated from the aforementioned algorithms, it will be an alphanumeric data of up to ten characters, represented in groups of 2 separated by the character "-". Example: 7B-CD-23-04-12


'*******input data
Authorization: 8004007852576
Invoice: 50753
DNI: 1048433012
Date: 2008/08/19 = 20080819
Cost= 91112.4 = 91112
Password: jWzCH3JDJY5[-A{Cwg\Ew7B=ci_Z}(X6HUaZu8(u4}9_Sz%cUWix+Vg7$rjD(qH Y

Algorithms: verhoeff, base64, alleged RC4

Control code: 1F-A8-98-84-1A
Feb 22 '21 #1
3 3090
212 Expert 128KB
But how?
The Verhoeff algorithm, for example, generates a check digit for a number, so it cannot be related to or applied to the password.
Feb 23 '21 #2
2 2Bits
You're right, I think I got complicated up there. What I was trying to do is look for an encryption, using VERHOEFF, RC4 and BASE64, which asks for Internal Taxes of my country ... but I already solved the VERHOEFF problem. What I would like is; generate a cipher using the RC4 algorithm, VBA language. In such a way as to satisfy the following examples:

message: yK5K
key: pPgiFS%)v}@N4W3aQqqXCEHVS2[aDw_n%3)pFyU%bEB9)YXt%xNBub4@PZ4S9)ct21885
algorithm: RC4 in VBA
encryption: 6212AF1B

message: kvP8
key: 442F3w5AggG7644D737asd4BH5677sasdL4%44643(3C3674F4 45644
algorithm: RC4 in VBA
encryption: 71D561C8

the code of example 2, is separated, the correct thing is:
Expand|Select|Wrap|Line Numbers
  1. key: 442F3w5AggG7644D737asd4BH5677sasdL4%44643(3C3674F445644
Note. I have tried using the algorithm posted by @Rabbit (https://bytes.com/topic/access/insig...m-vba-vbscript) but I can't get it to satisfy the above examples.
Feb 23 '21 #3
12,516 Expert Mod 8TB
The code in the article is fine. If you read it, the last paragraph explains why it won't match your situation. You just need to adjust it based on that.
Feb 24 '21 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

by: Karl Pech | last post by:
Hi all, I'm trying to write a program which can read in files in the following format: sos_encoded.txt: --- begin-base64 644 sos.txt UGxlYXNlLCBoZWxwIG1lIQ== ---
by: gRizwan | last post by:
Hello all, We have a problem on a webpage. That page is sent some email data in base64 format. what we need to do is, decode the base64 data back to original shape and extract attached image...
by: John | last post by:
Hi all, I've been going through google and yahoo looking for a certain base64 decoder in C without success. What I'm after is something that you can pass a base64 encoded string into and get back...
by: Phil C. | last post by:
(Cross post from framework.aspnet.security) Hi. I testing some asp.net code that generates a 256 bit Aes Symmetric Key and a 256 bit entropy value. I encrypt the Aes key(without storing it as...
by: Neo Geshel | last post by:
Greetings. I have managed to stitch together an awesome method of posting text along with an image to a database, in a way that allows an unlimited number of previews to ensure that text and...
by: Jay | last post by:
I have bean trying to get my head around reading .GIF files from base64 strings, Basically I need to specify a filename and convert it to base64 then I can copy/past the string to wear I want it....
by: Russell Warren | last post by:
I've got a case where I want to convert binary blocks of data (various ctypes objects) to base64 strings. The conversion calls in the base64 module expect strings as input, so right now I'm...
by: Roland Rickborn | last post by:
Hallo zusammen, in meine Anwendung ist ein Bild eingebettet und oben in der Leiste soll ein Icon erscheinen. Ausserdem will ich nur _eine_ Datei ausgeben, also ohne zusärtliche Bild-Dateien...
by: aruna.eies.eng | last post by:
i am currently trying to convert data into binary data.for that i need to know how to achieve it in c language and what are the libraries that we can use. so if any one can send me a sample code or...
by: pycraze | last post by:
Hi , I am currently trying to implement base64 encoding and decoding scheme in C . Python has a module , base64 , that will do the encoding and decoding with ease . I am aware of OpenSSL having...
by: isladogs | last post by:
The next online meeting of the Access Europe User Group will be on Wednesday 6 Dec 2023 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, Mike...
by: VivesProcSPL | last post by:
Obviously, one of the original purposes of SQL is to make data query processing easy. The language uses many English-like terms and syntax in an effort to make it easy to learn, particularly for...
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 3 Jan 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). For other local times, please check World Time Buddy In...
by: abbasky | last post by:
### Vandf component communication method one: data sharing ​ Vandf components can achieve data exchange through data sharing, state sharing, events, and other methods. Vandf's data exchange method...
by: jimatqsi | last post by:
The boss wants the word "CONFIDENTIAL" overlaying certain reports. He wants it large, slanted across the page, on every page, very light gray, outlined letters, not block letters. I thought Word Art...
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 7 Feb 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:30 (7.30PM). In this month's session, the creator of the excellent VBE...
by: stefan129 | last post by:
Hey forum members, I'm exploring options for SSL certificates for multiple domains. Has anyone had experience with multi-domain SSL certificates? Any recommendations on reliable providers or specific...
by: egorbl4 | last post by:
Скачал я git, хотел начать настройку, а там вылезло вот это Что это? Что мне с этим делать? ...
by: davi5007 | last post by:
Hi, Basically, I am trying to automate a field named TraceabilityNo into a web page from an access form. I've got the serial held in the variable strSearchString. How can I get this into the...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.