Solved

Using an encrypted  value to decrypt and display contents in vb6

Posted on 2016-11-27
9
59 Views
Last Modified: 2016-11-27
In our vb6 code we would like to use an encrypted value, say "Expert Exchange"  with a md5 hash resulting to '0x9C30220FD0E7FC190C24D0625469DCCB'.  We would like to use that has value and decrypt to display the result elsewhere.

How can we do this?
0
Comment
Question by:rayluvs
  • 4
  • 3
  • 2
9 Comments
 
LVL 45

Expert Comment

by:aikimark
ID: 41903178
hashing is a one-way algorithm.  While it is useful to see if things have been changed it can't be used in place of an encryption/decryption algorithm.  You can also use hashing to check to see if the encrypted value has been changed.
0
 
LVL 47

Accepted Solution

by:
Martin Liss earned 500 total points
ID: 41903343
Please see some encryption examples in this EE thread.
0
 
LVL 45

Expert Comment

by:aikimark
ID: 41903354
I've used Ken Isaacs's crypto VB library and even helped him with some of his code.  It has both encrypting and hashing routines.
https://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=74645&lngWId=1
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:rayluvs
ID: 41903485
Hi aikimark,

the link gave me an error 'Compile error: Can't find project or library':




Hi Martin,

We used your "encrypt.zip" and modified to our need and worked excellently!!!  

Question prior closing,

- What are the names or technical names of the 2 types of encryption in your code?

- Where can we find more info on these 2 encryption?

- Also, is there any limit we can use to pass the string to encrypt? that is, can we send a paragraph of 200 letters?

- Lastly, can we use special characters like ┼, ª, ├, ╚, etc. ?
0
 
LVL 47

Expert Comment

by:Martin Liss
ID: 41903486
Just uncheck it and you should be OK.
0
 

Author Comment

by:rayluvs
ID: 41903551
uncheck didn't work.  Like we said, your zip is what we are using.

Question prior closing, please answer:

  • What are the names or technical names of the 2 types of encryption in your code?
  • Where can we find more info on these 2 encryption?
  • Also, is there any limit we can use to pass the string to encrypt? that is, can we send a paragraph of 200 letters?
  • Lastly, can we use special characters like ┼, ª, ├, ╚, etc. ?
0
 
LVL 47

Assisted Solution

by:Martin Liss
Martin Liss earned 500 total points
ID: 41903557
I'm very sorry but I picked up that code from someplace at least 14 years ago and I really don't know much about it, so...

What are the names or technical names of the 2 types of encryption in your code? ==> I believe they are KKRSE and Simplecrypt
Where can we find more info on these 2 encryption? ==> I don't know
Also, is there any limit we can use to pass the string to encrypt? that is, can we send a paragraph of 200 letters? ==> I'm guessing but I'd say probably
Lastly, can we use special characters like ┼, ª, ├, ╚, etc. ? ==> Again guessing but probably not
0
 

Author Comment

by:rayluvs
ID: 41903587
Fair enough. Understood.
0
 
LVL 47

Expert Comment

by:Martin Liss
ID: 41903605
I'm glad I was able to help.

If you expand the “Full Biography” section of my profile you'll find links to some articles I've written that may interest you.

Marty - Microsoft MVP 2009 to 2016
              Experts Exchange MVE 2015
              Experts Exchange Top Expert Visual Basic Classic 2012 to 2015
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This code takes an Excel list of URL’s and adds a header titled “URL List”. It then searches through all URL’s in column “A”, looking for duplicates. When a duplicate is found, it is moved to the top of the list. The duplicate URL’s are then highlig…
With User Account Control (UAC) enabled in Windows 7, one needs to open an elevated Command Prompt in order to run scripts under administrative privileges. Although the elevated Command Prompt accomplishes the task, the question How to run as script…
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question