[Last Call] Learn how to a build a cloud-first strategyRegister Now


Repetable encryption values

Posted on 2011-04-21
Medium Priority
Last Modified: 2012-05-11
Hi everyone,
I am looking for a solution to the following problem...
I have 2 machines each with the same initial string value (aka key).  On each of the systems I want to encrypt the strings on both machines in such a way that after the encryption their values are the same, and to be able to encrypt each of them over and over again with equivelent results on both machines.  

So, I guess my fundamental question is - "given the same plain text starting point, does any specific encryption algorithm encrypt to the same value each time?"

Thanks very much for your help.
Question by:edc
LVL 16

Accepted Solution

imladris earned 2000 total points
ID: 35441303
Most of them do. Given a plain text and a key, most encryption algorithms will produce the same result every time. DES, Blowfish, Twofish, Skipjack are all like that.

Expert Comment

ID: 35441916
I’m not sure what your application is, but you may not necessarily require encryption.  Consider hashing the plain text “key.”  You can use either SHA1/MD5 (or others, but these are the “Golden” standards) algorithms.  If you don’t already know this, hashing allows you to go from KEY to HASH but not backwards, from HASH to KEY.  Like most encryption already mentioned, the same hashing algorithm on n different machines will give the same result given the same clear text input.

Author Comment

ID: 35442128
@imladris: Thank you for your answer.  I appreciate you sharing your knowledge.

@mbmast: Thank you as well for your answer.  We had originally looked at hashing specifically for that reason, however it left us hanging on a couple of other points that we needed to fulfill.  I appreciate you taking the time to share your knowledge.

Featured Post

How to Use the Help Bell

Need to boost the visibility of your question for solutions? Use the Experts Exchange Help Bell to confirm priority levels and contact subject-matter experts for question attention.  Check out this how-to article for more information.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Often, when implementing a feature, you won't know how certain events should be handled at the point where they occur and you'd rather defer to the user of your function or class. For example, a XML parser will extract a tag from the source code, wh…
This article will show you some of the more useful Standard Template Library (STL) algorithms through the use of working examples.  You will learn about how these algorithms fit into the STL architecture, how they work with STL containers, and why t…
The viewer will learn how to use the return statement in functions in C++. The video will also teach the user how to pass data to a function and have the function return data back for further processing.
The viewer will learn how to clear a vector as well as how to detect empty vectors in C++.
Suggested Courses

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question