Click here to Skip to main content
15,914,109 members
Please Sign up or sign in to vote.
0.00/5 (No votes)
See more:
For our project we need to code some of best ciphers known at this time.

Please give me the list of best ciphers

like blowfish, twofish, and etc...
Posted
Updated 29-Jun-12 21:11pm
v2

Akshayy,

Not to be rude, but a Google search limited to codeproject.com revealed numerous articles[^] that show how to do it and have explanations for Rinjdael.

I recommend watching a video[^] to better understand how it works.

I'll let you search for the Twofish one yourself.

Before you focus on the best encryption, you probably need to better understand what you are encrypting and why it is important or not. If you're writing code, I recommend reading about password security[^] before you worry about encryption.

Hogan
 
Share this answer
 
Comments
Sergey Alexandrovich Kryukov 27-Jun-12 13:54pm    
Fair enough, my 5.
--SA
Akshayy Tikekarr 28-Jun-12 0:22am    
Thank you sir and please its okay to me even if use any harsh words.. i am here to learn and being tough on me is accepted as every student should..
Akshayy Tikekarr 28-Jun-12 0:24am    
Also sir I am looking to make a program or software which will encrypt a password for anyone and save it in-case he forgets it. for that I am looking for mention techniques
If you are asking how these two encryptions do their job, here is a link for each of them, explaing more about them and their workings:

Rinjdael:
http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf[^]

Twofish:
http://www.schneier.com/twofish.html[^]

If you are more interested in how to use them, here would be a good place to start:

http://stackoverflow.com/questions/992019/java-256-bit-aes-password-based-encryption[^]
 
Share this answer
 
Comments
Sergey Alexandrovich Kryukov 27-Jun-12 13:54pm    
The question is answered, my 5.
--SA
Akshayy Tikekarr 28-Jun-12 0:24am    
Thank you sir I will refer these
With reference to your quoted requirement for recoverable encryption passwords have a look at Shamir's M of N algorithm[^]; split their password 2 from 3, keep one, mail one to them, and a trusted nominee ...
 
Share this answer
 

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)



CodeProject, 20 Bay Street, 11th Floor Toronto, Ontario, Canada M5J 2N8 +1 (416) 849-8900