[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9E97F0997FB84D42B221B9FB203EFA275CB4B4@dc1ms2.msad.brookshires.net>
From: toddtowles at brookshires.com (Todd Towles)
Subject: RE: Cipher Tool
Or you could go buy some of these and link them together to reach over a
distance.
The First Commercial Quantum Cryptography solution - encryption per
photon =)
http://www.magiqtech.com/index.php
> -----Original Message-----
> From: full-disclosure-bounces@...ts.netsys.com
> [mailto:full-disclosure-bounces@...ts.netsys.com] On Behalf
> Of James Tucker
> Sent: Wednesday, December 15, 2004 10:38 PM
> To: richard capistrano
> Cc: full-disclosure@...ts.netsys.com
> Subject: Re: [Full-Disclosure] RE: Cipher Tool
>
> Have you considered using secured network protocols on
> dedicated encryption hardware? or is that beyond the price point?
>
> Any cipher algorithm would be theoretically implementable
> (providing the length of data is suitable). If you are
> looking for _real_ performance though then ciphering may not
> be what you want as there isn't any good cipher that is
> really overly fast fast (deliberate double).
>
> There are other core pieces of the puzzle to be considered
> though, like are you going to be talking in a client less
> manner (i.e. is the client pre-configured or has the client
> never received secure comms
> before?) Is there a socket/tunnel already running? What is
> the rough length of the data set (impact readability and
> suitability for encryption algorithms)? What is the
> performance restriction (i.e.
> where is the bottleneck)? How secure do you need it,
> anti-fool, seconds, hours, years or millennial(might actually
> require more data storage than money can buy)?
>
> I raised an eyebrow at the last portion of your mail, "Is
> there a freeware or software or information, I can check
> out?". This would suggest that you are looking to put another
> program somewhere mid-flow in a data pipe; thats not always a
> good option.
>
> If you're really looking for speed and ease of implementation
> then something like a simple rotation cipher might work out
> for you, but this is going to be so poor a encryption that
> some cipher pro's could read it in its encrypted form. This
> is obviously no good if you're worried about credit card
> info, but is OK if it's just your girlfriend being a nosy ....... .
>
>
> On Tue, 14 Dec 2004 00:23:41 -0800 (PST), richard capistrano
> <mikoc02@...oo.com> wrote:
> >
> >
> >
> > Hello,
> >
> >
> >
> >
> >
> > We are looking for a tool that can actually cipher or hash a
> > particular portion of a file so that it will not display the
> > particular field of a file. This will be applied to the
> file so that
> > when it travels the network, the confidential field in the
> file is not
> > displayed in clear text. Due to performance issues, we can
> not simply hash the whole file.
> >
> >
> >
> > Is there a freeware or software or information, I can check out?
> > Thanks in advance.
> >
> > ________________________________
> > Do you Yahoo!?
> > Read only the mail you want - Yahoo! Mail SpamGuard.
> >
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
> >
> >
> >
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
Powered by blists - more mailing lists