ho dudes.
i wanna make some custom encryption functions to stop people snooping at my data. i dont wanna use aes or the other ones.
btw, i think that i may need the encryption template, when i saw through some crypto code.
can someone help with good code?
en.wikipedia.org/.../Blowfish_(cipher)
I helped implement this in an earler project - seemed easy enough to do and was secure enough for what I needed ( settop box)
=> And what if the Chinese knows about this back door without NSA knowing about it...
=====================================================================================
August 17, 2005 Chinese Cryptographers Denied U.S. Visas
www.schneier.com/.../chinese_cryptog.html
=>
Chinese cryptographer Xiaoyun Wang, the woman who broke SHA-1 last year, was unable to attend the Crypto conference to present her paper on Monday. The U.S. government didn't give her a visa in time:
Sadly, this is now common:
I really dont think its right forum to post this question but since you have worked extensively in this domain your inputs would be of great help.
Requirement: Avoiding repeated decryption of file/data Expected behavior of Algorithm:
Example: consider file(f0) on encryption gives encrypted file(ef0) and key(ek0) i.e f0 ----> ef0 and ek0.(repeating encryption of encrypted data) ef0 ----> ef1 and ek1. ef1 ----> ef2 and ek2. . . . efn-1 ----> efn and ekn.
On applying decryption on efn using ekn I should be able to get f0 bypassing decryption of (efn-1, ...ef2, ef1). Hence key is expected to have delta value during each successive encryption.
Is there any encryption and decryption algorithm currently displaying this behavior?
Looking forward for your suggestion.