?
Solved

Triple DES encription source code

Posted on 2003-03-10
5
Medium Priority
?
1,293 Views
Last Modified: 2008-02-01
Hello
Im looking for code in an suitable language to implement the ANSI X9.17 Pseudorandom Number generation scheme. The scheme uses triple DES and there are many instances of DES code available on the Net. But i can find any code which is working properly!!
Please help.
0
Comment
Question by:senna1
  • 2
4 Comments
 
LVL 8

Expert Comment

by:akshayxx
ID: 8103962
on this site download the source for ur platform .. this one provides  a lot of encryption routines
//not sure if this is fully free .. oR for evaluation only .. but it had link for source files for linux..
http://www.jetico.com/linux/bchelp/b_stree.htm
http://www.jetico.com/index.htm#/linux/
//

this one is  free and provides a lot of encryption routines
http://www.cs.auckland.ac.nz/~pgut001/cryptlib/

i remember using a library mcrypt .. but i dont remember if it had 3DES .. i'll check
0
 
LVL 8

Accepted Solution

by:
akshayxx earned 1120 total points
ID: 8103976
0
 

Expert Comment

by:MN_GMan
ID: 8109614
Here is a public domain one that has triple DES that I used a couple of years ago that seemed to work.

http://www.efgh.com/software/des.htm
0
 
LVL 20

Expert Comment

by:jmcg
ID: 10104390
Nothing has happened on this question in more than 9 months. It's time for cleanup!

My recommendation, which I will post in the Cleanup topic area, is to
accept answer by akshayxx.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

jmcg
EE Cleanup Volunteer
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Preface I don't like visual development tools that are supposed to write a program for me. Even if it is Xcode and I can use Interface Builder. Yes, it is a perfect tool and has helped me a lot, mainly, in the beginning, when my programs were small…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Video by: Grant
The goal of this video is to provide viewers with basic examples to understand and use nested-loops in the C programming language.
The goal of this video is to provide viewers with basic examples to understand opening and reading files in the C programming language.
Suggested Courses

579 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question