Solved

Hash Data

Posted on 2013-01-30
3
403 Views
Last Modified: 2013-02-14
Good morning

I have very little experience in programming is primarily a Hobi.

My problem is: I have to get a text ("text1") and through a public key (attached - Publickeyssh2.txt) encrypt (HASH), and paste the result in another text box ("Hash" ).

After this operation, I have yet to take that ciphertext ("Hash") and decrypt another text box ("text2"), using the private key attached (Privatkeyssh2.txt).

The private key has the following rules:
The RSA algorithm should be used with the following specifications on the parameters:
• Format = x.509
• charset = UTF-8
• Base-64 Encoding =
• endianess = Little Endian
• OAEP Padding = padding PKCS1 v1.5
• Size of the private key bits = 1024
• Format of the message Hash = SHA-2

I have attached an example

thank you
Ms-Access.zip
0
Comment
Question by:tekkinho
  • 2
3 Comments
 
LVL 61

Expert Comment

by:btan
ID: 38839685
So you having issue programming or having errors?
0
 

Author Comment

by:tekkinho
ID: 38844022
My problem is to programming.
0
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
ID: 38846220
maybe good that you share your codes and errors encountered - not possible to code it for you from fresh ... hope this may help

http://www.cryptosys.net/pki/rsa_encrypt_ex.html
http://www.cryptosys.net/pki/rsatechniques.html#examplesvb6
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…
Using Microsoft Access, learn some simple rules for how to construct tables in a relational database. Split up all multi-value fields into single values: Split up fields that belong to other things into separate tables: Make sure that all record…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now