Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. which encryption to use?

which encryption to use?

Scheduled Pinned Locked Moved The Lounge
algorithmssecurityquestion
5 Posts 3 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • P Offline
    P Offline
    Priyank Bolia
    wrote on last edited by
    #1

    Suppose A and B are talking, and X is listening their talk ( very bad:mad: ), A encrypts the message by a key which B sends to him, X knows the key and the algorithm to encrypt, is their any algorithm that only B can decrypt that message, and A and X can only encrypt the message. http://www.priyank.in/

    O M 2 Replies Last reply
    0
    • P Priyank Bolia

      Suppose A and B are talking, and X is listening their talk ( very bad:mad: ), A encrypts the message by a key which B sends to him, X knows the key and the algorithm to encrypt, is their any algorithm that only B can decrypt that message, and A and X can only encrypt the message. http://www.priyank.in/

      O Offline
      O Offline
      One Stone
      wrote on last edited by
      #2

      Have a look at the Diffie Hellman[^] key exchange system. After you've agreed to a key, use a symmetric cipher like AES, Twofish, etc.

      P 1 Reply Last reply
      0
      • O One Stone

        Have a look at the Diffie Hellman[^] key exchange system. After you've agreed to a key, use a symmetric cipher like AES, Twofish, etc.

        P Offline
        P Offline
        Priyank Bolia
        wrote on last edited by
        #3

        Thanks for the info!:) Infact, there is an implemenation also at CP: www.codeproject.com/cpp/DiffieHellmanExample.asp http://www.priyank.in/

        1 Reply Last reply
        0
        • P Priyank Bolia

          Suppose A and B are talking, and X is listening their talk ( very bad:mad: ), A encrypts the message by a key which B sends to him, X knows the key and the algorithm to encrypt, is their any algorithm that only B can decrypt that message, and A and X can only encrypt the message. http://www.priyank.in/

          M Offline
          M Offline
          markkuk
          wrote on last edited by
          #4

          Yes, this is called public key encryption[^]. There are several algorithms for that, the most commonly used is RSA[^].

          P 1 Reply Last reply
          0
          • M markkuk

            Yes, this is called public key encryption[^]. There are several algorithms for that, the most commonly used is RSA[^].

            P Offline
            P Offline
            Priyank Bolia
            wrote on last edited by
            #5

            markkuk wrote: Yes, this is called public key encryption[^]. I think you didn't get the question, anyway the answer is not RSA, its: http://www.codeproject.com/lounge.asp?df=1&forumid=1159&mpp=50&select=1138490#xx1138490xx http://www.priyank.in/

            1 Reply Last reply
            0
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Don't have an account? Register

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • World
            • Users
            • Groups