Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

POCO C++ Encryption SSL

Posted on 2011-02-17
3
Medium Priority
?
2,507 Views
Last Modified: 2012-06-27
I am implementing an application that is expected to send/receive user authentication info to a remote server. Planning to use POCO library for encryption. I am very new to this kind of C++ application. I see POCO Library (C++ library by Applied Informatics) provides cryptographic hash functions including MD2, MD3, MD5. Also, POCO provides NetSSL for secured communications. I am trying to figure if I can secure the communication of usernames and passwords simply by using the cryptographic hash functions in a static library or simply by using secured sockets or by using both. What are the pros and cons of each method? What are the generic requirements for each method (digital certification server, etc). Assume little to zero exposure to Socket Programming or Encryption.
0
Comment
Question by:Mydeen Yussouf
3 Comments
 
LVL 86

Assisted Solution

by:jkr
jkr earned 200 total points
ID: 34919883
I'd rather like to point you to boost's SSL support, as it's quite straightfoward and will save you a lot of both your time and scalp hair:

http://www.boost.org/doc/libs/1_36_0/doc/html/boost_asio/overview/ssl.html
http://www.boost.org/doc/libs/1_40_0/doc/html/boost_asio/example/ssl/client.cpp
http://www.boost.org/doc/libs/1_40_0/doc/html/boost_asio/example/ssl/server.cpp

The remaining headache will come from the SSL certificate thing, yet that's nicely described at http://devsec.org/info/ssl-cert.html ("Simple SSL cert HOWTO")
0
 
LVL 1

Author Comment

by:Mydeen Yussouf
ID: 34920531
Sorry I have to use POCO...
0
 
LVL 12

Accepted Solution

by:
trinitrotoluene earned 1800 total points
ID: 34924111
Well its usually a combination of both. A secure communication channel is established for encrypted communication.

If you want to make a start then what better place than

http://en.wikipedia.org/wiki/Secure_Sockets_Layer
http://en.wikipedia.org/wiki/Encryption

Also look around in Experts Exchange
http://www.experts-exchange.com/Security/Encryption/
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
The viewer will learn how to clear a vector as well as how to detect empty vectors in C++.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question