Solved

Encryption howto??

Posted on 2002-03-17
4
264 Views
Last Modified: 2010-04-15
Hi all,

I'm trying to figure out how to handle encryption.  I would like to create some sort of public/private key system - not necessarily as indepth as PGP or anything, but I am working on a small program that operates on the net that I would like to have some encryption done for the data.  Granted, I could use some basic rotating alphabet type algorythm, but I would really like a public / private key system.  Any help would be most appreciated.
0
Comment
Question by:navigator010897
  • 2
  • 2
4 Comments
 
LVL 22

Expert Comment

by:cookre
ID: 6875878
If this is for MS, have you looked at the CryptAPI?
0
 
LVL 1

Author Comment

by:navigator010897
ID: 6875981
No, I've never heard of CryptAPI - is it an addon product, or something that comes with MSV Studio?

Although I would love to have a way of doing it across platforms (ie: windows client/unix server), i'd be happy to start with just windows compatibility.
0
 
LVL 22

Accepted Solution

by:
cookre earned 200 total points
ID: 6876035
If you're using MS DevStudio (VC6), just bring up help/contents/search, enter 'cryptographic functions'
(they all start with 'Crypt' and are in the platform sdk)

Or:
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/security/Security/cryptoapi_system_architecture.asp
0
 
LVL 1

Author Comment

by:navigator010897
ID: 7011967
I can't give an A because it is platform specific to Windows OS, so it would be difficult to write a client for Windows and a server for Linux and get the encryption right since I would only know the Windows high level functions for encrypting / decrypting.

But it does provide a start, and does allow me to at least get encrypted messages from a windows server to a windows client and back.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Preface I don't like visual development tools that are supposed to write a program for me. Even if it is Xcode and I can use Interface Builder. Yes, it is a perfect tool and has helped me a lot, mainly, in the beginning, when my programs were small…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Video by: Grant
The goal of this video is to provide viewers with basic examples to understand and use nested-loops in the C programming language.
The goal of this video is to provide viewers with basic examples to understand opening and reading files in the C programming language.

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question