Click here to Skip to main content
15,892,480 members
Home / Discussions / Algorithms
   

Algorithms

 
QuestionRe: Parsing Algorithm to extract results from popular search engines Pin
Eddy Vluggen20-Mar-09 1:35
professionalEddy Vluggen20-Mar-09 1:35 
AnswerRe: Parsing Algorithm to extract results from popular search engines Pin
SaravananXSC25-Mar-09 7:44
SaravananXSC25-Mar-09 7:44 
AnswerRe: Parsing Algorithm to extract results from popular search engines Pin
Eddy Vluggen25-Mar-09 9:02
professionalEddy Vluggen25-Mar-09 9:02 
GeneralRe: Parsing Algorithm to extract results from popular search engines Pin
Pete O'Hanlon20-Mar-09 2:56
mvePete O'Hanlon20-Mar-09 2:56 
AnswerRe: Parsing Algorithm to extract results from popular search engines Pin
Ravadre21-Mar-09 6:31
Ravadre21-Mar-09 6:31 
GeneralRe: Parsing Algorithm to extract results from popular search engines Pin
SaravananXSC25-Mar-09 8:00
SaravananXSC25-Mar-09 8:00 
AnswerRe: Parsing Algorithm to extract results from popular search engines Pin
Mohammad Dayyan21-Mar-09 10:14
Mohammad Dayyan21-Mar-09 10:14 
QuestionJustification is requested. please help me resolve this problem. Phd and Prof Pin
Cryptogrpahy18-Mar-09 14:18
Cryptogrpahy18-Mar-09 14:18 
It is really needed me to proof my little cryptographic scheme because of i have used an own created cryptographic scheme to make secure for the mobile data transaction in a database system, and our lectures, who are professional on this cryptography, said "If it is used any created cryptographic algorithm to make secure for something then it would be done for proper cryptanalysis to prove that the algorithm is not hackable and to proof strength of algorithm first then it is possible to say as secure model. Otherwise it is not considered as secure.

I have heard about that cryptographic scheme is built after the mathematic justification is done but it is already done for programing implementation before the mathematic justification on the scheme/algorithm is done because of that time i had no idea about that all. If it is needed to rebuilt the scheme/algorithm again, it really hard for me to restart new one.

Cryptographic algorithm metric literature (1997), I've found, suggested about a few important metrics such as type, functions, key size, rounds, complexity, attack and strength but If it is new modern metric came out ready, i have not found it yet.

It is really needed justification on the proper cryptanalysis to prove that the scheme/algorithm is not hackable and to proof strength of algorithm as well

General detail of the algorithm follows as listed below.

Type: Symmetric
Functions: Confidentiality and authentication
Key size: 256 bit
Round: 3
Complexity: encryption, decryption and key setup include the expansion, bit operations, modular multiplications and modular exponentiations.
Attack: have not started to test it yet.
Strength: not started.

Additional info
encryption and decryption schemes work on numbers only because of data transaction in the database system uses numbers (not text and any other symbols)
Encryption
Input: 32 bits
Output: 128 bits

what need to do is better? If Any body, who are Phd, Prof and experts on the cryptography and were doing this before, please advice me?

Thank you
AnswerRe: Justification is requested. please help me resolve this problem. Phd and Prof Pin
Mark Churchill18-Mar-09 16:10
Mark Churchill18-Mar-09 16:10 
GeneralRe: Justification is requested. please help me resolve this problem. Phd and Prof Pin
Cryptogrpahy19-Mar-09 2:32
Cryptogrpahy19-Mar-09 2:32 
GeneralRe: Justification is requested. please help me resolve this problem. Phd and Prof Pin
Mark Churchill19-Mar-09 2:44
Mark Churchill19-Mar-09 2:44 
GeneralRe: Justification is requested. please help me resolve this problem. Phd and Prof Pin
Cryptogrpahy20-Mar-09 0:41
Cryptogrpahy20-Mar-09 0:41 
GeneralRe: Justification is requested. please help me resolve this problem. Phd and Prof Pin
Mark Churchill20-Mar-09 12:52
Mark Churchill20-Mar-09 12:52 
GeneralRe: Justification is requested. please help me resolve this problem. Phd and Prof Pin
Cryptogrpahy20-Mar-09 23:20
Cryptogrpahy20-Mar-09 23:20 
GeneralRe: Justification is requested. please help me resolve this problem. Phd and Prof Pin
Mark Churchill21-Mar-09 3:50
Mark Churchill21-Mar-09 3:50 
GeneralRe: Justification is requested. please help me resolve this problem. Phd and Prof Pin
supercat919-Mar-09 6:38
supercat919-Mar-09 6:38 
QuestionData Structures Pin
Visiolizer18-Mar-09 7:39
Visiolizer18-Mar-09 7:39 
AnswerRe: Data Structures Pin
Ravadre18-Mar-09 7:53
Ravadre18-Mar-09 7:53 
QuestionData Structures Pin
Visiolizer17-Mar-09 8:41
Visiolizer17-Mar-09 8:41 
AnswerRe: Data Structures Pin
Eslam Afifi20-Mar-09 2:07
Eslam Afifi20-Mar-09 2:07 
AnswerRe: Data Structures Pin
Mohammad Dayyan21-Mar-09 10:18
Mohammad Dayyan21-Mar-09 10:18 
QuestionHi Pin
olsion17-Mar-09 0:52
olsion17-Mar-09 0:52 
AnswerRe: Hi Pin
Pete O'Hanlon17-Mar-09 2:29
mvePete O'Hanlon17-Mar-09 2:29 
GeneralRe: Hi Pin
Cedric Moonen17-Mar-09 3:53
Cedric Moonen17-Mar-09 3:53 
JokeRe: Hi Pin
Yusuf17-Mar-09 4:18
Yusuf17-Mar-09 4:18 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.