Crypting passwords
-
Here I am again! Well, now I have to know how to encrypt a string into unknown chars, e.g: d45R#! = sw.5v.n7.sd.4r.h5 // sw = d and 5v = 4 and n7 = 5 etc. I know this is difficult (it should be!?), but how to do it? Is there a code somewhere? It would be more safe to make it by your own but I don't know HOW! ;) When I tried to write a binary to the registry I could get the string anyway! :( ------------------------------ ©0d3 ©®4©k3® - That's me! :) ------------------------------
-
Here I am again! Well, now I have to know how to encrypt a string into unknown chars, e.g: d45R#! = sw.5v.n7.sd.4r.h5 // sw = d and 5v = 4 and n7 = 5 etc. I know this is difficult (it should be!?), but how to do it? Is there a code somewhere? It would be more safe to make it by your own but I don't know HOW! ;) When I tried to write a binary to the registry I could get the string anyway! :( ------------------------------ ©0d3 ©®4©k3® - That's me! :) ------------------------------
Do you need to do 1 way or reversable encryption?
-
Do you need to do 1 way or reversable encryption?
I don't under stand... But I want to encrypt and then decrypt... ------------------------------ ©0d3 ©®4©k3® - That's me! :) ------------------------------
-
I don't under stand... But I want to encrypt and then decrypt... ------------------------------ ©0d3 ©®4©k3® - That's me! :) ------------------------------
Generally password encryption is done with a "trapdoor" algorithm, i.e. you can't decrypt. You record the encrypted password then, when someone tries to log in or whatever, the password they enter in encrypted through the same algorithm and the encrypted versions compared. This kind of encrypted version is often called a "digest".
-
Generally password encryption is done with a "trapdoor" algorithm, i.e. you can't decrypt. You record the encrypted password then, when someone tries to log in or whatever, the password they enter in encrypted through the same algorithm and the encrypted versions compared. This kind of encrypted version is often called a "digest".
Malcolm McMahon wrote: the password they enter in encrypted through the same algorithm and the encrypted versions compared. Correct. That is the same thing that I told you (Rickard/CodeCracker) on your earlier post: you can use a MD5 hash, and compare the hashed values to perform matching. If you will never need to "show" the password to the user (meaning, they can set an initial password, logon with a password, change their password, but never have it shown to them), then using a Digest is a pretty good solution. Peace! -=- James.
-
Malcolm McMahon wrote: the password they enter in encrypted through the same algorithm and the encrypted versions compared. Correct. That is the same thing that I told you (Rickard/CodeCracker) on your earlier post: you can use a MD5 hash, and compare the hashed values to perform matching. If you will never need to "show" the password to the user (meaning, they can set an initial password, logon with a password, change their password, but never have it shown to them), then using a Digest is a pretty good solution. Peace! -=- James.
Tell me where to read about it! I've tried MSDN Library but can't find anything about the MD5! :( ------------------------------ ©0d3 ©®4©k3® - That's me! :) ------------------------------
-
Tell me where to read about it! I've tried MSDN Library but can't find anything about the MD5! :( ------------------------------ ©0d3 ©®4©k3® - That's me! :) ------------------------------
A google search turned up: The MD5 Homepage