Click here to Skip to main content
16,015,755 members
Home / Discussions / Algorithms
   

Algorithms

 
GeneralRe: Homework Question - honest!! Pin
Malcolm Smart6-Oct-07 9:39
Malcolm Smart6-Oct-07 9:39 
GeneralRe: Homework Question - honest!! Pin
Luc Pattyn6-Oct-07 9:45
sitebuilderLuc Pattyn6-Oct-07 9:45 
GeneralRe: Homework Question - honest!! Pin
Paul Conrad6-Oct-07 9:47
professionalPaul Conrad6-Oct-07 9:47 
GeneralRe: Homework Question - honest!! Pin
Urs Enzler9-Oct-07 5:04
Urs Enzler9-Oct-07 5:04 
AnswerRe: How to get Best Possible Combination from an ArrayList Pin
Rob Graham6-Oct-07 4:29
Rob Graham6-Oct-07 4:29 
Questionencryption algorithm Pin
sc_emb4-Oct-07 20:08
sc_emb4-Oct-07 20:08 
AnswerRe: encryption algorithm Pin
cp98764-Oct-07 21:09
cp98764-Oct-07 21:09 
AnswerRe: encryption algorithm Pin
PICguy9-Oct-07 20:19
PICguy9-Oct-07 20:19 
Perhaps I’m just going over semantics here but...are not public keys supposed to be public? The public key for your device can be public. Your device needs the public keys of authorized senders. And perhaps its own RSA key pair if it needs to say much in return.

In the following E(key, msg) is RSA encryption of msg with public key and D(key, msg) is RSA decryption using public key. E’() and D’() are the same except they use the private RSA key.

msg = D’(key, E(key, msg))

Alice: (plain text) I am Alice, an authorized sender.
Device: Oh? Prove it. Here is a time stamp...
Alice sends D’(keyAlice, Oct 9 2007 2228)
Note – Alice uses her private DEcryption key here.
(Device computes E(keyAlice, above message. All is okay.)
Note – Device encrypts to decrypt. I know it sounds strange.
Alice sends E(deviceKey, long random Blowfish key) + Blowfish encrypted message using the just sent key.
Device recovers Blowfish key with D’(deviceKey, key part of prior message)

The point is simple. The device needs only the public keys of trusted senders. If you need a CA for that then you need a CA.

You might find that Twofish is easier to implement. In particular you do not need over 4000 bytes of pi. And a place to keep them for the next encryption. But if you have a hard drive that should not be a problem. On a machine large enough to be reasonable to do Twofish I would hardcode q0 & q1 and generate a table of already permuted MDS stuff on the fly. I.e. 512 bytes of hard coded constants + 4096 bytes of table generated as part of your key setup.

Twofish ain’t that complex if I can implement the thing in both x86 and ARM assembly. I’ll do it for the Z80 or a PIC with several hundred bytes of RAM if someone will pay me. I bought Schneier’s book “used.” It made that nice cracking sound when I first opened it. My overall comments on Twofish: it appears more than a little over designed. And you don’t need 3 different encode / decode procedures for different key lengths.

. . . .

Oh wait. After writing the above I just reread your original message. Apparently you have multiple devices needing public keys.

You can only allow trusted public keys into your system. Start with your public key. Your machines trust you. Only you or someone you delegate may enter new authorized users. In effect YOU are the CA.

Don’t forget about physical access and how that can compromise your devices.

-Peter
Questionhow to convert a string to a mathematical function Pin
nta_388626-Sep-07 2:55
nta_388626-Sep-07 2:55 
AnswerRe: how to convert a string to a mathematical function Pin
David Crow26-Sep-07 4:48
David Crow26-Sep-07 4:48 
AnswerRe: how to convert a string to a mathematical function Pin
Dan Neely26-Sep-07 5:25
Dan Neely26-Sep-07 5:25 
GeneralRe: how to convert a string to a mathematical function Pin
El Corazon26-Sep-07 9:45
El Corazon26-Sep-07 9:45 
AnswerRe: how to convert a string to a mathematical function Pin
Russell'27-Sep-07 0:35
Russell'27-Sep-07 0:35 
AnswerRe: how to convert a string to a mathematical function Pin
Urs Enzler27-Sep-07 1:16
Urs Enzler27-Sep-07 1:16 
AnswerRe: how to convert a string to a mathematical function Pin
Luc Pattyn27-Sep-07 3:29
sitebuilderLuc Pattyn27-Sep-07 3:29 
AnswerRe: how to convert a string to a mathematical function Pin
PICguy9-Oct-07 20:57
PICguy9-Oct-07 20:57 
QuestionWhich algorithm fits best ? Pin
kkadir24-Sep-07 9:19
kkadir24-Sep-07 9:19 
AnswerRe: Which algorithm fits best ? Pin
PICguy24-Sep-07 14:21
PICguy24-Sep-07 14:21 
GeneralRe: Which algorithm fits best ? Pin
kkadir25-Sep-07 3:36
kkadir25-Sep-07 3:36 
AnswerRe: Which algorithm fits best ? Pin
Russell'26-Sep-07 0:04
Russell'26-Sep-07 0:04 
GeneralRe: Which algorithm fits best ? Pin
kkadir26-Sep-07 11:06
kkadir26-Sep-07 11:06 
GeneralRe: Which algorithm fits best ? Pin
Russell'26-Sep-07 22:07
Russell'26-Sep-07 22:07 
GeneralRe: Which algorithm fits best ? Pin
mulletcheese28-Sep-07 6:02
mulletcheese28-Sep-07 6:02 
QuestionCode for Travelling Salesman Problem Pin
laremtj24-Sep-07 8:56
laremtj24-Sep-07 8:56 
AnswerRe: Code for Travelling Salesman Problem Pin
Paul Conrad24-Sep-07 13:18
professionalPaul Conrad24-Sep-07 13:18 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.