Click here to Skip to main content
14,451,668 members
Rate this:
Please Sign up or sign in to vote.
See more:
how we can implement cryptographic algorithms in computer ?and what softwares we can use for implement cryptographic algorithms ?
nv3 20-Feb-13 5:09am
(a) by writing a some software in a suitable programming language.
(b) any software that fits that purpose.

Now honestly, this elementary question can only be answered by referring you to the standard text books of programming and cryptography. So start with Google, get a list of good books, study them, and you are almost there.
Rate this:
Please Sign up or sign in to vote.

Solution 1

Read some basic about cryptography.

A good atarting point:[^]

If you understand your first lessons, you will find a lot of useful links at the end of the article.

I am your Nanny ;-)
Rate this:
Please Sign up or sign in to vote.

Solution 2

For the .NET part you should really explore this namespace: System.Security.Cryptography Namespace[^].
and for Java:
JavaTM Cryptography Extension (JCE)[^]
As a book on cryptography I'd recommend Applied Cryptography, by Bruce Schneier[^].


— Manfred
Rate this:
Please Sign up or sign in to vote.

Solution 3

Applied Cryptography by Bruce Schneier was always the first point of reference when I was working in the credit card personalisation sector. I still have a copy of it in my bookshelf.

As for a C++ library, I would strongly recommend the Crypto++ library which is a very good library for encryption and encoding of a variety of data streams and has a lot of good documentation.

As has been pointed out Java and .NET libraries exist in the standard frameworks and both have reasonable documentation.

The important thing to remember about cryptography is that the algorithms are not the real problem, it is the key management. Also remember that cryptography is used in a variety of ways (authentication, integrity, confidentiality etc) but it all boils down to risk management. Assess the risk of the data being compromised and the cost involved in addressing the situation when it has been and make sure you choose security measures appropriately.

Having worked directly in an industry that relies upon such things, cryptography is easy, key management is difficult. complete security is impossible.

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

CodeProject, 503-250 Ferrand Drive Toronto Ontario, M3C 3G8 Canada +1 416-849-8900 x 100