1. Looking for old file encode.e

Gday guys, I'm looking for an old library written by Derek called encode.e It's no longer in the archive. I used it many years ago and cant find it in my backups.

new topic     » topic index » view message » categorize

2. Re: Looking for old file encode.e

tonysteward said...

Gday guys, I'm looking for an old library written by Derek called encode.e It's no longer in the archive. I used it many years ago and cant find it in my backups.

Is it this one ?

https://dl.dropboxusercontent.com/u/100730175/encode.e

new topic     » goto parent     » topic index » view message » categorize

3. Re: Looking for old file encode.e

DerekParnell said...
tonysteward said...

Gday guys, I'm looking for an old library written by Derek called encode.e It's no longer in the archive. I used it many years ago and cant find it in my backups.

Is it this one ?

https://dl.dropboxusercontent.com/u/100730175/encode.e

Something i did not understand then, or now: assuming this might be used for scrambling an email access, the recipient would need the same code the sender used, and the clear password beforehand, to generate the encrypted password to compare to what was sent by the sender. Or, the encrypted password would need to be sent in the clear as the password to the host, the same way the unencrypted password could have been sent. Either way, if all the traffic that the sender has ever sent has been logged, the password, encrypted or not, was sent, and is therefor known. And possibly the configured encode.e that made the encrypted password.

Or am i missing something?

useless

new topic     » goto parent     » topic index » view message » categorize

4. Re: Looking for old file encode.e

Kat said...

Something i did not understand ..., the recipient would need the same code the sender used, and the clear password beforehand, to generate the encrypted password to compare to what was sent by the sender. ...

Or am i missing something?

No, you are not missing something. This does not use a public/private key mechanism. The keys, or access to the (next) keys, needs to be given via an entirely different mechanism. The better way of doing this is using some sort of one-time-pad that all legal parties to the data know about. It would be a security issue to keep this protected so this is not expected to be used for long-term sensitive data. Another method is to use a public-private key system (e.g AES256) to generate the keys for encoding.

new topic     » goto parent     » topic index » view message » categorize

5. Re: Looking for old file encode.e

DerekParnell said...
tonysteward said...

Gday guys, I'm looking for an old library written by Derek called encode.e It's no longer in the archive. I used it many years ago and cant find it in my backups.

Is it this one ?

https://dl.dropboxusercontent.com/u/100730175/encode.e

Yes thats it thank you.

new topic     » goto parent     » topic index » view message » categorize

6. Re: Looking for old file encode.e

DerekParnell said...
useless_ said...

Something i did not understand ..., the recipient would need the same code the sender used, and the clear password beforehand, to generate the encrypted password to compare to what was sent by the sender. ...

Or am i missing something?

No, you are not missing something. This does not use a public/private key mechanism. The keys, or access to the (next) keys, needs to be given via an entirely different mechanism. The better way of doing this is using some sort of one-time-pad that all legal parties to the data know about. It would be a security issue to keep this protected so this is not expected to be used for long-term sensitive data. Another method is to use a public-private key system (e.g AES256) to generate the keys for encoding.

You could also use some sort of Diffie-Hellman key exchange to produce a shared secret between two parties. This is useful if you're sending encrypted content on-the-wire as part of your own protocol.

-Greg

new topic     » goto parent     » topic index » view message » categorize

7. Re: Looking for old file encode.e

DerekParnell said...
Kat said...

Something i did not understand ..., the recipient would need the same code the sender used, and the clear password beforehand, to generate the encrypted password to compare to what was sent by the sender. ...

Or am i missing something?

No, you are not missing something. This does not use a public/private key mechanism. The keys, or access to the (next) keys, needs to be given via an entirely different mechanism. The better way of doing this is using some sort of one-time-pad that all legal parties to the data know about. It would be a security issue to keep this protected so this is not expected to be used for long-term sensitive data. Another method is to use a public-private key system (e.g AES256) to generate the keys for encoding.

They would also need the same encode.e, which contains the algorithm(s), magic number(s), pad value(s), etc(s). If a 3rd party did not have the encode.e, they could force it to be exchanged, and possibly captured intact, by corrupting either the sender's or the reciever's copy. A similar scene would be to swap out a wheel of the Enigma machine, it would still work, but now be incompatable with all other machines, at a minimum a whole new set of wheels would need to be sent.

useless

new topic     » goto parent     » topic index » view message » categorize

Search



Quick Links

User menu

Not signed in.

Misc Menu