Solved

Hash Data

Posted on 2013-01-30
3
422 Views
Last Modified: 2013-02-14
Good morning

I have very little experience in programming is primarily a Hobi.

My problem is: I have to get a text ("text1") and through a public key (attached - Publickeyssh2.txt) encrypt (HASH), and paste the result in another text box ("Hash" ).

After this operation, I have yet to take that ciphertext ("Hash") and decrypt another text box ("text2"), using the private key attached (Privatkeyssh2.txt).

The private key has the following rules:
The RSA algorithm should be used with the following specifications on the parameters:
• Format = x.509
• charset = UTF-8
• Base-64 Encoding =
• endianess = Little Endian
• OAEP Padding = padding PKCS1 v1.5
• Size of the private key bits = 1024
• Format of the message Hash = SHA-2

I have attached an example

thank you
Ms-Access.zip
0
Comment
Question by:tekkinho
  • 2
3 Comments
 
LVL 62

Expert Comment

by:btan
ID: 38839685
So you having issue programming or having errors?
0
 

Author Comment

by:tekkinho
ID: 38844022
My problem is to programming.
0
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 38846220
maybe good that you share your codes and errors encountered - not possible to code it for you from fresh ... hope this may help

http://www.cryptosys.net/pki/rsa_encrypt_ex.html
http://www.cryptosys.net/pki/rsatechniques.html#examplesvb6
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Explore the encryption capabilities built into Google Apps and how these features can help you meet privacy policy and regulatory compliance, but are not a full solution. Understand and compare the most popular email encryption services for Google A…
Preparing an email is something we should all take special care with – especially when the email is for somebody you may not know very well. The pressures of everyday working life stacked with a hectic office environment can make this a real challen…
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…
With Microsoft Access, learn how to start a database in different ways and produce different start-up actions allowing you to use a single database to perform multiple tasks. Specify a start-up form through options: Specify an Autoexec macro: Us…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question