lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: toddtowles at brookshires.com (Todd Towles) Subject: RE: Cipher Tool Or you could go buy some of these and link them together to reach over a distance. The First Commercial Quantum Cryptography solution - encryption per photon =) http://www.magiqtech.com/index.php > -----Original Message----- > From: full-disclosure-bounces@...ts.netsys.com > [mailto:full-disclosure-bounces@...ts.netsys.com] On Behalf > Of James Tucker > Sent: Wednesday, December 15, 2004 10:38 PM > To: richard capistrano > Cc: full-disclosure@...ts.netsys.com > Subject: Re: [Full-Disclosure] RE: Cipher Tool > > Have you considered using secured network protocols on > dedicated encryption hardware? or is that beyond the price point? > > Any cipher algorithm would be theoretically implementable > (providing the length of data is suitable). If you are > looking for _real_ performance though then ciphering may not > be what you want as there isn't any good cipher that is > really overly fast fast (deliberate double). > > There are other core pieces of the puzzle to be considered > though, like are you going to be talking in a client less > manner (i.e. is the client pre-configured or has the client > never received secure comms > before?) Is there a socket/tunnel already running? What is > the rough length of the data set (impact readability and > suitability for encryption algorithms)? What is the > performance restriction (i.e. > where is the bottleneck)? How secure do you need it, > anti-fool, seconds, hours, years or millennial(might actually > require more data storage than money can buy)? > > I raised an eyebrow at the last portion of your mail, "Is > there a freeware or software or information, I can check > out?". This would suggest that you are looking to put another > program somewhere mid-flow in a data pipe; thats not always a > good option. > > If you're really looking for speed and ease of implementation > then something like a simple rotation cipher might work out > for you, but this is going to be so poor a encryption that > some cipher pro's could read it in its encrypted form. This > is obviously no good if you're worried about credit card > info, but is OK if it's just your girlfriend being a nosy ....... . > > > On Tue, 14 Dec 2004 00:23:41 -0800 (PST), richard capistrano > <mikoc02@...oo.com> wrote: > > > > > > > > Hello, > > > > > > > > > > > > We are looking for a tool that can actually cipher or hash a > > particular portion of a file so that it will not display the > > particular field of a file. This will be applied to the > file so that > > when it travels the network, the confidential field in the > file is not > > displayed in clear text. Due to performance issues, we can > not simply hash the whole file. > > > > > > > > Is there a freeware or software or information, I can check out? > > Thanks in advance. > > > > ________________________________ > > Do you Yahoo!? > > Read only the mail you want - Yahoo! Mail SpamGuard. > > > > > > _______________________________________________ > > Full-Disclosure - We believe in it. > > Charter: http://lists.netsys.com/full-disclosure-charter.html > > > > > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html >
Powered by blists - more mailing lists