Knowledge

Talk:Encryption software

Source đź“ť

588:/* Create the cipher object that we need */ XSECProvider prov; XENCCipher *cipher; cipher = prov.newCipher(doc); /* Now generate a random key that we can use to encrypt the element * * First check the status of the random generation in OpenSSL */ if (RAND_status() != 1) { cerr << "OpenSSL random generation not properly initialised" << endl; exit(1); } unsigned char keyBuf; if (RAND_bytes(keyBuf, 24) == 0) { cerr << "Error obtaining 24 bytes of random from OpenSSL" << endl; exit(1); 288: 476:
by a lion and a polar bear. The files ciphered by open passwords, are decrypted only by the appropriate closed passwords. Effraction is eliminated even theoretically as at significant simplification of Algorithm of encryption of files random bytes there is an Algorithm of encryption by one-time notebooks which, as is known, is not cracked basically. This conclusion is made by experts at discussion on forums in the Internet
200: 172: 264: 22: 140: 80: 53: 418: 350: 475:
free of charge it is possible to download the program on encryption of CryptoService.exe files in which as the open and closed passwords photos of politicians of Russia will be used led by Putinym V.V., photos of the most well-known picturesque cloths in a history of mankind, a photo of animals led
495:
Real experts would point out that this algorithm has not been published in an academic journal, has not gone through any standardisation process and hence has not received any reasonable scrutiny. Hence there is no reason for trusting the claims made by the author himself.
563:
I am new to this subject. Recently I lost my pendrive which holds my personal data the same is not encrypted. Now I realise the importance of encryption. I want to use the encryption software. which is the best freely availabale software. Pleas suggest.
662:
My opinion is that the article should primarily discuss where, when, why, and how encryption software is used. Examples of commercially-available software could be added, when appropriate, but I don't think they should be the focus.
699:
should be about encryption software - first by categorizing the types of encryption software (encryption for data at rest, encryption for data in transit, etc.), and then by sub-categorizing (for example) data at rest into
837: 130: 817: 381: 832: 302: 782: 154: 695:. The article was rejected, and when I began explaining the difference between file and file system encryption, I was directed to this group. Long story short, IMO 827: 753: 433: 802: 787: 777: 248: 772: 120: 712:. In short, the efforts of many Wikipediaer's may need to be reorganized a bit. Am willing to propose a plan and add content, if that will be helpful. 812: 792: 767: 278: 254: 528:. But specific content about software is missing, despite the fact that there are quite a large number of wikipedia articles on cryptographic software. 630:
As mentioned above, this article has a problem with vagueness. Right now it's titled "encryption software" but it contains assorted discussion about
687:
As a newb to Knowledge, and not knowing about this group, I attempted to begin improving content in this domain. First, by replacing a redirect of
842: 797: 315: 297: 186: 96: 807: 520:. Most of content is better suited for the articles describing the concrete topic. E.g., details of the AES selection process should be in the 149: 63: 597: 574: 483: 224: 452:. The original page is now a redirect to this page. For the contribution history and old versions of the redirected article, please see 524:
page. Section choosing encryption seems to try to distinguish between stream ciphers and block ciphers, better described in the article
497: 87: 58: 529: 721: 644:
Still needs work, in my opinion. Should there be a focus on commercially-available software, not just theoretical discussion? --
847: 207: 177: 822: 273: 182: 631: 521: 33: 705: 692: 390:
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
429: 691:
with an article about encrypting files and directories. Previously, the content lumped encrypting a file into
601: 578: 364: 487: 21: 501: 525: 533: 717: 688: 220: 516:
What is the purpose of this article? Right now it just contains a somewhat random selection of topics on
39: 593: 570: 479: 696: 449: 223:
on Knowledge. If you would like to participate, please visit the project page, where you can join
95:
on Knowledge. If you would like to participate, please visit the project page, where you can join
709: 713: 445: 359: 668: 649: 616: 548: 749: 730: 701: 708:(which may need some work) and other types of software encryption that I discuss here: 393:
Find editors who have shown interest in this subject and ask them to take a look here.
761: 517: 92: 287: 664: 645: 612: 544: 263: 199: 171: 672: 653: 638: 620: 605: 582: 552: 537: 505: 216: 139: 635: 212: 79: 52: 349: 710:
User_talk:Onel5969#Seeking_clarification_on_.22deleted.22_article
611:
Do a Google-search to find free encryption tools you can use. --
472: 412: 15: 348: 286: 262: 138: 838:
Start-Class Computer Security articles of High-importance
634:. Needs some work to decide what should be done with it. 457: 453: 424: 341: 336: 331: 326: 211:, a collaborative effort to improve the coverage of 91:, a collaborative effort to improve the coverage of 683:File and Directory (aka Folder) Encryption Article 371:Review importance and quality of existing articles 253:This article has not yet received a rating on the 818:Start-Class software articles of High-importance 723:_File_and_Directory_(aka_Folder)_Encryptio": --> 374:Identify categories related to Computer Security 754:Knowledge:Articles for deletion/Cycles per byte 543:Six years later, is the article better now? -- 8: 467:The interesting program, The unusual program 19: 833:High-importance Computer Security articles 477: 380:Identify articles for creation (see also: 310: 166: 47: 783:High-importance Computer science articles 362:. Please allow some days for processing. 168: 49: 828:Start-Class Computer Security articles 704:(which appears to be a good article), 803:Unknown-importance Computing articles 788:WikiProject Computer science articles 778:Start-Class Computer science articles 7: 773:Top-importance Cryptography articles 752:to this article per the discussion: 205:This article is within the scope of 85:This article is within the scope of 38:It is of interest to the following 632:selection of encryption algorithms 105:Knowledge:WikiProject Cryptography 14: 813:High-importance software articles 793:WikiProject Cryptography articles 768:Start-Class Cryptography articles 387:Identify articles for improvement 108:Template:WikiProject Cryptography 416: 198: 170: 78: 51: 20: 233:Knowledge:WikiProject Computing 125:This article has been rated as 843:All Computer Security articles 798:Start-Class Computing articles 473:http://crypto-service.narod.ru 236:Template:WikiProject Computing 1: 808:Start-Class software articles 654:04:28, 28 December 2014 (UTC) 621:04:24, 28 December 2014 (UTC) 553:04:22, 28 December 2014 (UTC) 506:19:52, 20 February 2009 (UTC) 358:will be generated shortly by 316:WikiProject Computer Security 298:WikiProject Computer Security 295:This article is supported by 271:This article is supported by 227:and see a list of open tasks. 147:This article is supported by 99:and see a list of open tasks. 639:18:48, 8 December 2011 (UTC) 606:19:19, 13 October 2009 (UTC) 150:WikiProject Computer science 706:Filesystem-level_encryption 693:Filesystem-level_encryption 864: 724:14:13, 24 March 2017 (UTC) 681:Encryption Software -: --> 673:16:11, 11 March 2015 (UTC) 255:project's importance scale 583:07:52, 28 July 2008 (UTC) 456:; for its talk page, see 309: 294: 270: 252: 193: 146: 124: 73: 46: 538:19:44, 22 May 2008 (UTC) 88:WikiProject Cryptography 526:symmetric-key algorithm 512:Purpose of this article 848:All Computing articles 689:File/folder_encryption 490:) 14:47, May 26, 2006‎ 353: 291: 267: 221:information technology 143: 28:This article is rated 823:All Software articles 567:Regards Sunil Kumar 352: 290: 266: 208:WikiProject Computing 142: 111:Cryptography articles 722:_Applications_-: --> 444:. Its contents were 440:with a consensus to 377:Tag related articles 314:Things you can help 274:WikiProject Software 697:Encryption_software 682:Applications -: --> 450:Encryption software 365:More information... 428:was nominated for 354: 292: 268: 239:Computing articles 144: 34:content assessment 596:comment added by 585: 573:comment added by 491: 482:comment added by 464: 463: 438:20 September 2019 411: 410: 407: 406: 403: 402: 399: 398: 165: 164: 161: 160: 855: 745: 744: 740: 608: 568: 420: 419: 413: 382:Article requests 367: 311: 241: 240: 237: 234: 231: 202: 195: 194: 189: 174: 167: 131:importance scale 113: 112: 109: 106: 103: 82: 75: 74: 69: 66: 64:Computer science 55: 48: 31: 25: 24: 16: 863: 862: 858: 857: 856: 854: 853: 852: 758: 757: 750:cycles per byte 746: 742: 738: 736: 735: 731:Cycles per byte 702:Disk_encryption 685: 628: 591: 589: 561: 514: 469: 425:Cycles per byte 417: 368: 363: 346: 303:High-importance 279:High-importance 238: 235: 232: 229: 228: 180: 155:High-importance 110: 107: 104: 101: 100: 67: 61: 32:on Knowledge's 29: 12: 11: 5: 861: 859: 851: 850: 845: 840: 835: 830: 825: 820: 815: 810: 805: 800: 795: 790: 785: 780: 775: 770: 760: 759: 734: 727: 684: 679: 678: 677: 676: 675: 657: 656: 627: 624: 598:208.68.153.113 587: 575:210.18.119.115 560: 557: 556: 555: 513: 510: 509: 508: 484:195.161.247.36 468: 465: 462: 461: 436:was closed on 434:The discussion 421: 409: 408: 405: 404: 401: 400: 397: 396: 395: 394: 391: 388: 385: 378: 375: 372: 356:Article alerts 347: 345: 344: 339: 334: 329: 323: 320: 319: 307: 306: 293: 283: 282: 269: 259: 258: 251: 245: 244: 242: 225:the discussion 203: 191: 190: 175: 163: 162: 159: 158: 145: 135: 134: 127:Top-importance 123: 117: 116: 114: 97:the discussion 83: 71: 70: 68:Top‑importance 56: 44: 43: 37: 26: 13: 10: 9: 6: 4: 3: 2: 860: 849: 846: 844: 841: 839: 836: 834: 831: 829: 826: 824: 821: 819: 816: 814: 811: 809: 806: 804: 801: 799: 796: 794: 791: 789: 786: 784: 781: 779: 776: 774: 771: 769: 766: 765: 763: 756: 755: 751: 741: 732: 728: 726: 725: 719: 715: 711: 707: 703: 698: 694: 690: 680: 674: 670: 666: 661: 660: 659: 658: 655: 651: 647: 643: 642: 641: 640: 637: 633: 626:Article focus 625: 623: 622: 618: 614: 609: 607: 603: 599: 595: 586: 584: 580: 576: 572: 565: 558: 554: 550: 546: 542: 541: 540: 539: 535: 531: 527: 523: 519: 511: 507: 503: 499: 498:62.203.21.250 494: 493: 492: 489: 485: 481: 474: 466: 459: 455: 451: 447: 443: 439: 435: 431: 427: 426: 422: 415: 414: 392: 389: 386: 383: 379: 376: 373: 370: 369: 366: 361: 357: 351: 343: 340: 338: 335: 333: 330: 328: 325: 324: 322: 321: 317: 313: 312: 308: 304: 301:(assessed as 300: 299: 289: 285: 284: 280: 277:(assessed as 276: 275: 265: 261: 260: 256: 250: 247: 246: 243: 226: 222: 218: 214: 210: 209: 204: 201: 197: 196: 192: 188: 184: 179: 176: 173: 169: 156: 153:(assessed as 152: 151: 141: 137: 136: 132: 128: 122: 119: 118: 115: 98: 94: 90: 89: 84: 81: 77: 76: 72: 65: 60: 57: 54: 50: 45: 41: 35: 27: 23: 18: 17: 748:I merged in 747: 714:User93454235 686: 629: 610: 590: 566: 562: 518:cryptography 515: 478:— Preceding 471:From a site 470: 441: 437: 423: 355: 296: 272: 206: 148: 126: 102:Cryptography 93:Cryptography 86: 59:Cryptography 40:WikiProjects 592:—Preceding 569:—Preceding 530:85.1.105.55 454:its history 30:Start-class 762:Categories 729:Merger of 559:encryption 360:AAlertBot 230:Computing 217:computing 213:computers 178:Computing 594:unsigned 571:unsigned 480:unsigned 430:deletion 187:Security 183:Software 332:history 129:on the 737:": --> 665:Maslen 646:AstroU 613:AstroU 545:AstroU 446:merged 219:, and 36:scale. 448:into 442:merge 342:purge 337:watch 318:with: 739:edit 718:talk 669:talk 650:talk 617:talk 602:talk 579:talk 549:talk 534:talk 502:talk 488:talk 458:here 327:edit 636:FT2 522:AES 432:. 249:??? 121:Top 764:: 720:) 671:) 652:) 619:) 604:) 581:) 551:) 536:) 504:) 305:). 281:). 215:, 185:/ 181:: 157:). 62:: 743:] 733:] 716:( 667:( 648:( 615:( 600:( 577:( 547:( 532:( 500:( 486:( 460:. 384:) 257:. 133:. 42::

Index


content assessment
WikiProjects
WikiProject icon
Cryptography
Computer science
WikiProject icon
WikiProject Cryptography
Cryptography
the discussion
Top
importance scale
Taskforce icon
WikiProject Computer science
High-importance
WikiProject icon
Computing
Software
Security
WikiProject icon
WikiProject Computing
computers
computing
information technology
the discussion
???
project's importance scale
Taskforce icon
WikiProject Software
High-importance

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑