Talk:Encryption software
The interesting program The unusual program From a site http://crypto-service.narod.ru free of charge it is possible to download the program on encryption of CryptoService.exe files in which as the open and closed passwords photos of politicians of Russia will be used led by Putinym V.V., photos of the most well-known picturesque cloths in a history of mankind, a photo of animals led by a lion and a polar bear. The files ciphered by open passwords, are decrypted only by the appropriate closed passwords. Effraction is eliminated even theoretically as at significant simplification of Algorithm of encryption of files random bytes there is an Algorithm of encryption by one-time notebooks which, as is known, is not cracked basically. This conclusion is made by experts at discussion on forums in the Internet
- Real experts would point out that this algorithm has not been published in an academic journal, has not gone through any standardisation process and hence has not received any reasonable scrutiny. Hence there is no reason for trusting the claims made by the author himself. 62.203.21.250 (talk) 19:52, 20 February 2009 (UTC)
Purpose of this article
What is the purpose of this article? Right now it just contains a somewhat random selection of topics on cryptography. Most of content is better suited for the articles describing the concrete topic. E.g., details of the AES selection process should be in the AES page. Section choosing encryption seems to try to distinguish between stream ciphers and block ciphers, better described in the article symmetric-key algorithm. But specific content about software is missing, despite the fact that there are quite a large number of wikipedia articles on cryptographic software. 85.1.105.55 (talk) 19:44, 22 May 2008 (UTC)
encryption
I am new to this subject. Recently I lost my pendrive which holds my personal data the same is not encrypted. Now I realise the importance of encryption. I want to use the encryption software. which is the best freely availabale software. Pleas suggest.
Regards Sunil Kumar —Preceding unsigned comment added by 210.18.119.115 (talk) 07:52, 28 July 2008 (UTC)
/* Create the cipher object that we need */
XSECProvider prov; XENCCipher *cipher;
cipher = prov.newCipher(doc);
/* Now generate a random key that we can use to encrypt the element * * First check the status of the random generation in OpenSSL */
if (RAND_status() != 1) {
cerr << "OpenSSL random generation not properly initialised" << endl; exit(1);
}
unsigned char keyBuf[24]; if (RAND_bytes(keyBuf, 24) == 0) {
cerr << "Error obtaining 24 bytes of random from OpenSSL" << endl; exit(1);