Talk:Encryption software
![]() | Software: Computing Stub‑class | ||||||||||||
|
![]() | Cryptography: Computer science Stub‑class | ||||||||||||
|
The interesting program, The unusual program
From a site http://crypto-service.narod.ru free of charge it is possible to download the program on encryption of CryptoService.exe files in which as the open and closed passwords photos of politicians of Russia will be used led by Putinym V.V., photos of the most well-known picturesque cloths in a history of mankind, a photo of animals led by a lion and a polar bear. The files ciphered by open passwords, are decrypted only by the appropriate closed passwords. Effraction is eliminated even theoretically as at significant simplification of Algorithm of encryption of files random bytes there is an Algorithm of encryption by one-time notebooks which, as is known, is not cracked basically. This conclusion is made by experts at discussion on forums in the Internet — Preceding unsigned comment added by 195.161.247.36 (talk) 14:47, May 26, 2006
- Real experts would point out that this algorithm has not been published in an academic journal, has not gone through any standardisation process and hence has not received any reasonable scrutiny. Hence there is no reason for trusting the claims made by the author himself. 62.203.21.250 (talk) 19:52, 20 February 2009 (UTC)
Purpose of this article
What is the purpose of this article? Right now it just contains a somewhat random selection of topics on cryptography. Most of content is better suited for the articles describing the concrete topic. E.g., details of the AES selection process should be in the AES page. Section choosing encryption seems to try to distinguish between stream ciphers and block ciphers, better described in the article symmetric-key algorithm. But specific content about software is missing, despite the fact that there are quite a large number of wikipedia articles on cryptographic software. 85.1.105.55 (talk) 19:44, 22 May 2008 (UTC)
- Six years later, is the article better now? -- AstroU (talk) 04:22, 28 December 2014 (UTC)
encryption
I am new to this subject. Recently I lost my pendrive which holds my personal data the same is not encrypted. Now I realise the importance of encryption. I want to use the encryption software. which is the best freely availabale software. Pleas suggest.
Regards Sunil Kumar —Preceding unsigned comment added by 210.18.119.115 (talk) 07:52, 28 July 2008 (UTC)
/* Create the cipher object that we need */ XSECProvider prov; XENCCipher *cipher; cipher = prov.newCipher(doc); /* Now generate a random key that we can use to encrypt the element * * First check the status of the random generation in OpenSSL */ if (RAND_status() != 1) { cerr << "OpenSSL random generation not properly initialised" << endl; exit(1); } unsigned char keyBuf[24]; if (RAND_bytes(keyBuf, 24) == 0) { cerr << "Error obtaining 24 bytes of random from OpenSSL" << endl; exit(1);
—Preceding unsigned comment added by 208.68.153.113 (talk) 19:19, 13 October 2009 (UTC)
Do a Google-search to find free encryption tools you can use. -- AstroU (talk) 04:24, 28 December 2014 (UTC)
Article focus
As mentioned above, this article has a problem with vagueness. Right now it's titled "encryption software" but it contains assorted discussion about selection of encryption algorithms. Needs some work to decide what should be done with it. FT2 (Talk | email) 18:48, 8 December 2011 (UTC)
- Still needs work, in my opinion. Should there be a focus on commercially-available software, not just theoretical discussion? -- AstroU (talk) 04:28, 28 December 2014 (UTC)
- Stub-Class software articles
- Unknown-importance software articles
- Stub-Class software articles of Unknown-importance
- Stub-Class Computing articles
- Unknown-importance Computing articles
- All Computing articles
- All Software articles
- Stub-Class Cryptography articles
- Unknown-importance Cryptography articles
- Stub-Class Computer science articles
- Unknown-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles