The JAVA project Photo Web Cameras with FTP client has been modernized. The project is being prepared for publication in full, ready for compilation and installation.
Android Open Java Project When encrypting information, cryptographic providers are widely used - an independent module that allows you to perform cryptographic operations in operating systems. With a high degree of probability, the one who created the cryptographic provider has more opportunities to decode encrypted information. Android has its own crypto providers, accessed through the mechanism Crypto API If you encrypt information about the number of bottles of sparkling water sold in your store, then this is more than enough. If you're writing encryption software for a business with hundreds of thousands of dollars in revenue, you might consider making the information unrecoverable. Well, here is the answer. It is necessary to make the encrypted information corrupted. And if you messed it up yourself, then you know how to fix it "on the other side". And here you should not use transformations by functions. To spoil - so to spoil! Android Open Java Project
Entropy correction module We generate short arrays of numbers (keys) and use different algorithms each time. An entropy correction module ( EnCalibrate ) has been added to the application. In the basic version. Custom versions can be released in a short time. At the next stage, the ability to manually configure parameters for generating, converting and sampling numbers will be added. The first module (method) for setting up feedback in MULTIMODE mode is currently being tested. Czech Entropy PRNG PS. The application does not encrypt information. This is just a random number generator
Bloom-Blum-Shub The Bloom-Blum-Shub algorithm is very interesting and, if certain conditions are met, allows you to generate crypto-resistant pseudo-random numbers of large size. But if you generate numbers of 1024 bits or 2048 bits, then all the prime numbers that you can use in this algorithm have long been known. The required pairs of prime numbers for the algorithm are even smaller. And there is a risk of successful cryptanalysis of your protected data. It makes sense to use multiple layers of data encryption so that decoded at one layer does not give a meaningful view of the data. And at each level, use algorithms to improve data quality. This is of little use for stream encryption. But for storing personal data, master keys, passwords, PIN codes, tokens it can be very, very successful. And at the same time synchronicity is maintained. Those. multiple generators will create the same keys (numbers) on any number of generator instances. The downside is that generator instances nee
Comments
Post a Comment