Jump to content

Talk:Encryption software

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by AstroU (talk | contribs) at 04:23, 28 December 2014 (Purpose of this article: Thanks for the article.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconSoftware: Computing Stub‑class
WikiProject iconThis article is within the scope of WikiProject Software, a collaborative effort to improve the coverage of software on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StubThis article has been rated as Stub-class on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
WikiProject iconCryptography: Computer science Stub‑class
WikiProject iconThis article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StubThis article has been rated as Stub-class on Wikipedia's content assessment scale.
???This article has not yet received a rating on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science.

The interesting program, The unusual program

From a site http://crypto-service.narod.ru free of charge it is possible to download the program on encryption of CryptoService.exe files in which as the open and closed passwords photos of politicians of Russia will be used led by Putinym V.V., photos of the most well-known picturesque cloths in a history of mankind, a photo of animals led by a lion and a polar bear. The files ciphered by open passwords, are decrypted only by the appropriate closed passwords. Effraction is eliminated even theoretically as at significant simplification of Algorithm of encryption of files random bytes there is an Algorithm of encryption by one-time notebooks which, as is known, is not cracked basically. This conclusion is made by experts at discussion on forums in the Internet — Preceding unsigned comment added by 195.161.247.36 (talk) 14:47, May 26, 2006‎

Real experts would point out that this algorithm has not been published in an academic journal, has not gone through any standardisation process and hence has not received any reasonable scrutiny. Hence there is no reason for trusting the claims made by the author himself. 62.203.21.250 (talk) 19:52, 20 February 2009 (UTC)[reply]

Purpose of this article

What is the purpose of this article? Right now it just contains a somewhat random selection of topics on cryptography. Most of content is better suited for the articles describing the concrete topic. E.g., details of the AES selection process should be in the AES page. Section choosing encryption seems to try to distinguish between stream ciphers and block ciphers, better described in the article symmetric-key algorithm. But specific content about software is missing, despite the fact that there are quite a large number of wikipedia articles on cryptographic software. 85.1.105.55 (talk) 19:44, 22 May 2008 (UTC)[reply]

Six years later, is the article better now? -- AstroU (talk) 04:22, 28 December 2014 (UTC)[reply]

encryption

I am new to this subject. Recently I lost my pendrive which holds my personal data the same is not encrypted. Now I realise the importance of encryption. I want to use the encryption software. which is the best freely availabale software. Pleas suggest.

Regards Sunil Kumar —Preceding unsigned comment added by 210.18.119.115 (talk) 07:52, 28 July 2008 (UTC)[reply]

/* Create the cipher object that we need */

        XSECProvider prov;
        XENCCipher *cipher;

        cipher = prov.newCipher(doc);

        /* Now generate a random key that we can use to encrypt the element
         *
         * First check the status of the random generation in OpenSSL
         */

        if (RAND_status() != 1) {

            cerr << "OpenSSL random generation not properly initialised" << endl;
            exit(1);

        }

        unsigned char keyBuf[24];
        if (RAND_bytes(keyBuf, 24) == 0) {

            cerr << "Error obtaining 24 bytes of random from OpenSSL" << endl;
            exit(1);

—Preceding unsigned comment added by 208.68.153.113 (talk) 19:19, 13 October 2009 (UTC)[reply]

Article focus

As mentioned above, this article has a problem with vagueness. Right now it's titled "encryption software" but it contains assorted discussion about selection of encryption algorithms. Needs some work to decide what should be done with it. FT2 (Talk | email) 18:48, 8 December 2011 (UTC)[reply]