Solved

How To Implement RSA ?

Posted on 2004-10-27
399 Views
Last Modified: 2010-04-05
How can  I Implement RSA Encryption in Delphi ?
or can i get the full algorithm of RSA ?
0
Question by:jimy7s
    9 Comments
     
    LVL 17

    Expert Comment

    by:geobul
    http://www.crypto-central.com

    free without source.

    Regards, Geo
    0
     
    LVL 44

    Expert Comment

    by:aikimark
    0
     
    LVL 12

    Expert Comment

    by:Lee_Nover
    0
     

    Author Comment

    by:jimy7s
    Guys i need just RSA algorithm (cryptosystem) .
    0
     
    LVL 12

    Expert Comment

    by:Lee_Nover
    yes .. and ? just use it ..
    u'll hardly find an implementation of JUST RSA .. there are mostly packs
    DEC I recommended is the fastest and has the most ciphers and hashes I know :)
    what'll u use is up to you
    0
     

    Author Comment

    by:jimy7s
    "  Lee_Nover " i need exactly RSA for educational perpose .
    thanks any way .
    0
     
    LVL 17

    Accepted Solution

    by:
    About RSA algorithm itself (maths):
    http://www.di-mgt.com.au/rsa_alg.html
    http://world.std.com/~franl/crypto/rsa-guts.html

    You will need a library for working with large numbers at least.
    0
     
    LVL 44

    Expert Comment

    by:aikimark
    It's one thing to understand and algorithm/process in order to teach it.  It is an entirely different problem to implement an algorithm in a particular language (Object Pascal) that might not have the native data types required to implement your algorithm efficiently.  Since RSA implementation with Delphi requires non-intrinsic datatypes, we recommend using one of the opensource solutions, rather than "reinventing the wheel" and possibly introducing errors.
    0
     

    Author Comment

    by:jimy7s
    Thanks All .
    0

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone. Privacy Policy Terms of Use

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
    Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    how to add IIS SMTP to handle application/Scanner relays into office 365.

    875 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    12 Experts available now in Live!

    Get 1:1 Help Now