shyam sunder prasad wrote:lot of people are using md5 for encryption,so how they are validating the password then?
suppose user entering password then how can i validate it ?![]()
shyam sunder prasad wrote:lot of people are using md5 for encryption
Ulf Dittmer wrote:Did you read Pat's and my posts about how that is impossible?
shyam sunder prasad wrote:Can Help me out how to write encrypt-er and decrypt er with any cryptographic hash (MD5, SHA1, SHA256, etc.). ?
Retired horse trader.
Note: double-underline links may be advertisements automatically added by this site and are probably not endorsed by me.
James Sabre wrote:then this is most definitely possible.
Pat Farrell wrote:
James Sabre wrote:then this is most definitely possible.
Only if you mean "encipher and decipher using an untrusted algorithm that happens to have MD5, SHA1, etc. as one part"
You are proposing a hack that uses the crypto-hash as a key generator to a stream cipher.
Later on, you properly say "just use AES" or TwoFish, BlowFish, etc. which is the real advice.
Home-grown ciphers nearly always have fatal flaws. Using the known, proven, and already implemented ciphers is not only easier than hacking something together, its far more likely to actually achieve what your goal is. At least if the goal is to secure the passwords. Even with a proven algorithm, it is easy to screw up and lose your security.
At a higher level, the standard is to use a one-way hash for a reason. There is no practical advantage to being able to decrypt a password, and there are many practical disadvantages. In short, not only is doing what the OP asked impossible as phrased, but even if you changed it to a more generic "How do I crypt and decrypt passwords in my system" the only proper answer is "don't do that"
Retired horse trader.
Note: double-underline links may be advertisements automatically added by this site and are probably not endorsed by me.
James Sabre wrote:Edit : Section 14.11 in "Applied Cryptography" second edition by Bruce Schneier describes several schemes in the same vein as the one I outlined. If not the the actual bible, this book is at least considered one of the gospels of cryptography.
Pat Farrell wrote:
James Sabre wrote:Edit : Section 14.11 in "Applied Cryptography" second edition by Bruce Schneier describes several schemes in the same vein as the one I outlined. If not the the actual bible, this book is at least considered one of the gospels of cryptography.
And for that tiny percentage of programmers who have read and understand Applied Cryptography, its only a minor sin to do as you propose.
Retired horse trader.
Note: double-underline links may be advertisements automatically added by this site and are probably not endorsed by me.
James Sabre wrote:I described an approach to cryptography using message digest that could be used and then went on to say it should not be used.
Pat Farrell wrote:
James Sabre wrote:I described an approach to cryptography using message digest that could be used and then went on to say it should not be used.
I fail to see any reason that you have posted the approach
Retired horse trader.
Note: double-underline links may be advertisements automatically added by this site and are probably not endorsed by me.
Trust God, but always tether your camel... to this tiny ad.
The Low Tech Laboratory Movie Kickstarter is LIVE NOW!
https://www.kickstarter.com/projects/paulwheaton/low-tech
|