PhD. who are good at the cryptography [modified]
-
Hi dear reader. I did symmetric key data encryption and decryption algorithms, which are focused on small one byte for encrypting and output sixteen bytes for decryption, ready but problem is that i could not checked it my strength of the algorithm yet because of the not sure the criteria of the measurements for cryptography and algorithm as well. I hope a professional person,who are good the cryptography or got expensive experience of at this area, can help me to resolve my problem and can advice what i to do that is better. Help me please? Thank you Regards Bimbaa -- modified at 9:56 Tuesday 30th October, 2007
-
Hi dear reader. I did symmetric key data encryption and decryption algorithms, which are focused on small one byte for encrypting and output sixteen bytes for decryption, ready but problem is that i could not checked it my strength of the algorithm yet because of the not sure the criteria of the measurements for cryptography and algorithm as well. I hope a professional person,who are good the cryptography or got expensive experience of at this area, can help me to resolve my problem and can advice what i to do that is better. Help me please? Thank you Regards Bimbaa -- modified at 9:56 Tuesday 30th October, 2007
it should measure the strength of the algorithm by measure the criteria of your algorithm. Take my advice 1. the algorithm should implement it and check the speed of your program. the program should run in high speed time to avoid the atacker to attack your application....this is first criteria. 2. the data model who want to secure it should be consistent to be insure that your algoeith work correctly. 3. analyze the cost of the algoeith also good 4. ask the mathmatical person for another criterias measure criteria because the speed only not enough.
researcher need advice
-
Hi dear reader. I did symmetric key data encryption and decryption algorithms, which are focused on small one byte for encrypting and output sixteen bytes for decryption, ready but problem is that i could not checked it my strength of the algorithm yet because of the not sure the criteria of the measurements for cryptography and algorithm as well. I hope a professional person,who are good the cryptography or got expensive experience of at this area, can help me to resolve my problem and can advice what i to do that is better. Help me please? Thank you Regards Bimbaa -- modified at 9:56 Tuesday 30th October, 2007
-
Hi dear reader. I did symmetric key data encryption and decryption algorithms, which are focused on small one byte for encrypting and output sixteen bytes for decryption, ready but problem is that i could not checked it my strength of the algorithm yet because of the not sure the criteria of the measurements for cryptography and algorithm as well. I hope a professional person,who are good the cryptography or got expensive experience of at this area, can help me to resolve my problem and can advice what i to do that is better. Help me please? Thank you Regards Bimbaa -- modified at 9:56 Tuesday 30th October, 2007
http://csrc.nist.gov/nissc/1997/proceedings/128.pdf
Need a C# Consultant? I'm available.
Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway -
http://csrc.nist.gov/nissc/1997/proceedings/128.pdf
Need a C# Consultant? I'm available.
Happiness in intelligent people is the rarest thing I know. -- Ernest HemingwayOh thanks dear. This paper is important for me and published ready before ten years ago. Is the criteria of measurement for the cryptography in this paper still same with nowadays criteria?
-
Oh thanks dear. This paper is important for me and published ready before ten years ago. Is the criteria of measurement for the cryptography in this paper still same with nowadays criteria?
I would imagine so. If not it is still a good baseline.
Need a C# Consultant? I'm available.
Happiness in intelligent people is the rarest thing I know. -- Ernest Hemingway -
Hi dear reader. I did symmetric key data encryption and decryption algorithms, which are focused on small one byte for encrypting and output sixteen bytes for decryption, ready but problem is that i could not checked it my strength of the algorithm yet because of the not sure the criteria of the measurements for cryptography and algorithm as well. I hope a professional person,who are good the cryptography or got expensive experience of at this area, can help me to resolve my problem and can advice what i to do that is better. Help me please? Thank you Regards Bimbaa -- modified at 9:56 Tuesday 30th October, 2007
If you are lucky (I was once), you could pose your question to Prof. Rivest. You'll stand a much better chance of receiving help if you ask specific questions that can be easily answered without the reader having to invest much time.
"Normal is getting dressed in clothes that you buy for work and driving through traffic in a car that you are still paying for, in order to get to the job you need to pay for the clothes and the car and the house you leave vacant all day so you can afford to live in it." - Ellen Goodman
"To have a respect for ourselves guides our morals; to have deference for others governs our manners." - Laurence Sterne
-
If you are lucky (I was once), you could pose your question to Prof. Rivest. You'll stand a much better chance of receiving help if you ask specific questions that can be easily answered without the reader having to invest much time.
"Normal is getting dressed in clothes that you buy for work and driving through traffic in a car that you are still paying for, in order to get to the job you need to pay for the clothes and the car and the house you leave vacant all day so you can afford to live in it." - Ellen Goodman
"To have a respect for ourselves guides our morals; to have deference for others governs our manners." - Laurence Sterne
Hey David Crow. This is also important for me. Thank you for your giving contacts.
-
Hey David Crow. This is also important for me. Thank you for your giving contacts.
It's not like I gave you secret information. His Web page, as well as his e-mail address, are public.
"Normal is getting dressed in clothes that you buy for work and driving through traffic in a car that you are still paying for, in order to get to the job you need to pay for the clothes and the car and the house you leave vacant all day so you can afford to live in it." - Ellen Goodman
"To have a respect for ourselves guides our morals; to have deference for others governs our manners." - Laurence Sterne
-
It's not like I gave you secret information. His Web page, as well as his e-mail address, are public.
"Normal is getting dressed in clothes that you buy for work and driving through traffic in a car that you are still paying for, in order to get to the job you need to pay for the clothes and the car and the house you leave vacant all day so you can afford to live in it." - Ellen Goodman
"To have a respect for ourselves guides our morals; to have deference for others governs our manners." - Laurence Sterne
Yes. dear your right. I have seen the contact and sent him a mail ready. Thank you again.David