Click here to Skip to main content
13,090,299 members (90,825 online)
Rate this:
Please Sign up or sign in to vote.
See more:
how we can implement cryptographic algorithms in computer ?and what softwares we can use for implement cryptographic algorithms ?
Posted 19-Feb-13 22:21pm
nv3 20-Feb-13 5:09am
(a) by writing a some software in a suitable programming language.
(b) any software that fits that purpose.

Now honestly, this elementary question can only be answered by referring you to the standard text books of programming and cryptography. So start with Google, get a list of good books, study them, and you are almost there.
Rate this: bad
Please Sign up or sign in to vote.

Solution 1

Read some basic about cryptography.

A good atarting point:[^]

If you understand your first lessons, you will find a lot of useful links at the end of the article.

I am your Nanny ;-)
Rate this: bad
Please Sign up or sign in to vote.

Solution 2

For the .NET part you should really explore this namespace: System.Security.Cryptography Namespace[^].
and for Java:
JavaTM Cryptography Extension (JCE)[^]
As a book on cryptography I'd recommend Applied Cryptography, by Bruce Schneier[^].


— Manfred
Rate this: bad
Please Sign up or sign in to vote.

Solution 3

Applied Cryptography by Bruce Schneier was always the first point of reference when I was working in the credit card personalisation sector. I still have a copy of it in my bookshelf.

As for a C++ library, I would strongly recommend the Crypto++ library which is a very good library for encryption and encoding of a variety of data streams and has a lot of good documentation.

As has been pointed out Java and .NET libraries exist in the standard frameworks and both have reasonable documentation.

The important thing to remember about cryptography is that the algorithms are not the real problem, it is the key management. Also remember that cryptography is used in a variety of ways (authentication, integrity, confidentiality etc) but it all boils down to risk management. Assess the risk of the data being compromised and the cost involved in addressing the situation when it has been and make sure you choose security measures appropriately.

Having worked directly in an industry that relies upon such things, cryptography is easy, key management is difficult. complete security is impossible.

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

  Print Answers RSS
Top Experts
Last 24hrsThis month

Advertise | Privacy |
Web04 | 2.8.170813.1 | Last Updated 25 Mar 2013
Copyright © CodeProject, 1999-2017
All Rights Reserved. Terms of Service
Layout: fixed | fluid

CodeProject, 503-250 Ferrand Drive Toronto Ontario, M3C 3G8 Canada +1 416-849-8900 x 100