Click here to Skip to main content
Rate this: bad
good
Please Sign up or sign in to vote.
See more: C++/CLI Java .NET
how we can implement cryptographic algorithms in computer ?and what softwares we can use for implement cryptographic algorithms ?
Posted 19-Feb-13 23:21pm
Comments
nv3 at 20-Feb-13 5:09am
   
(a) by writing a some software in a suitable programming language.
(b) any software that fits that purpose.
 
Now honestly, this elementary question can only be answered by referring you to the standard text books of programming and cryptography. So start with Google, get a list of good books, study them, and you are almost there.
Rate this: bad
good
Please Sign up or sign in to vote.

Solution 1

Read some basic about cryptography.
 
A good atarting point: http://en.wikipedia.org/wiki/Cryptography[^]
 
If you understand your first lessons, you will find a lot of useful links at the end of the article.
 
I am your Nanny Wink | ;-)
  Permalink  
Rate this: bad
good
Please Sign up or sign in to vote.

Solution 2

For the .NET part you should really explore this namespace: System.Security.Cryptography Namespace[^].
and for Java:
JavaTM Cryptography Extension (JCE)[^]
As a book on cryptography I'd recommend Applied Cryptography, by Bruce Schneier[^].
 
Regards,
 
— Manfred
  Permalink  
Rate this: bad
good
Please Sign up or sign in to vote.

Solution 3

Applied Cryptography by Bruce Schneier was always the first point of reference when I was working in the credit card personalisation sector. I still have a copy of it in my bookshelf.
 
As for a C++ library, I would strongly recommend the Crypto++ library which is a very good library for encryption and encoding of a variety of data streams and has a lot of good documentation.
 
As has been pointed out Java and .NET libraries exist in the standard frameworks and both have reasonable documentation.
 
The important thing to remember about cryptography is that the algorithms are not the real problem, it is the key management. Also remember that cryptography is used in a variety of ways (authentication, integrity, confidentiality etc) but it all boils down to risk management. Assess the risk of the data being compromised and the cost involved in addressing the situation when it has been and make sure you choose security measures appropriately.
 
Having worked directly in an industry that relies upon such things, cryptography is easy, key management is difficult. complete security is impossible.
  Permalink  

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

  Print Answers RSS
0 OriginalGriff 390
1 Sergey Alexandrovich Kryukov 329
2 BillWoodruff 210
3 Afzaal Ahmad Zeeshan 204
4 CPallini 185
0 OriginalGriff 5,515
1 DamithSL 4,451
2 Maciej Los 3,902
3 Kornfeld Eliyahu Peter 3,480
4 Sergey Alexandrovich Kryukov 3,175


Advertise | Privacy | Mobile
Web03 | 2.8.141216.1 | Last Updated 25 Mar 2013
Copyright © CodeProject, 1999-2014
All Rights Reserved. Terms of Service
Layout: fixed | fluid

CodeProject, 503-250 Ferrand Drive Toronto Ontario, M3C 3G8 Canada +1 416-849-8900 x 100