Talk:Encryption software
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||
|
Cycles per byte was nominated for deletion. The discussion was closed on 20 September 2019 with a consensus to merge. Its contents were merged into Encryption software. The original page is now a redirect to this page. For the contribution history and old versions of the redirected article, please see its history; for its talk page, see here. |
The interesting program, The unusual program
[edit]From a site http://crypto-service.narod.ru free of charge it is possible to download the program on encryption of CryptoService.exe files in which as the open and closed passwords photos of politicians of Russia will be used led by Putinym V.V., photos of the most well-known picturesque cloths in a history of mankind, a photo of animals led by a lion and a polar bear. The files ciphered by open passwords, are decrypted only by the appropriate closed passwords. Effraction is eliminated even theoretically as at significant simplification of Algorithm of encryption of files random bytes there is an Algorithm of encryption by one-time notebooks which, as is known, is not cracked basically. This conclusion is made by experts at discussion on forums in the Internet — Preceding unsigned comment added by 195.161.247.36 (talk) 14:47, May 26, 2006
- Real experts would point out that this algorithm has not been published in an academic journal, has not gone through any standardisation process and hence has not received any reasonable scrutiny. Hence there is no reason for trusting the claims made by the author himself. 62.203.21.250 (talk) 19:52, 20 February 2009 (UTC)
Purpose of this article
[edit]What is the purpose of this article? Right now it just contains a somewhat random selection of topics on cryptography. Most of content is better suited for the articles describing the concrete topic. E.g., details of the AES selection process should be in the AES page. Section choosing encryption seems to try to distinguish between stream ciphers and block ciphers, better described in the article symmetric-key algorithm. But specific content about software is missing, despite the fact that there are quite a large number of wikipedia articles on cryptographic software. 85.1.105.55 (talk) 19:44, 22 May 2008 (UTC)
- Six years later, is the article better now? -- AstroU (talk) 04:22, 28 December 2014 (UTC)
encryption
[edit]I am new to this subject. Recently I lost my pendrive which holds my personal data the same is not encrypted. Now I realise the importance of encryption. I want to use the encryption software. which is the best freely availabale software. Pleas suggest.
Regards Sunil Kumar —Preceding unsigned comment added by 210.18.119.115 (talk) 07:52, 28 July 2008 (UTC)
/* Create the cipher object that we need */ XSECProvider prov; XENCCipher *cipher; cipher = prov.newCipher(doc); /* Now generate a random key that we can use to encrypt the element * * First check the status of the random generation in OpenSSL */ if (RAND_status() != 1) { cerr << "OpenSSL random generation not properly initialised" << endl; exit(1); } unsigned char keyBuf[24]; if (RAND_bytes(keyBuf, 24) == 0) { cerr << "Error obtaining 24 bytes of random from OpenSSL" << endl; exit(1);
—Preceding unsigned comment added by 208.68.153.113 (talk) 19:19, 13 October 2009 (UTC)
Do a Google-search to find free encryption tools you can use. -- AstroU (talk) 04:24, 28 December 2014 (UTC)
Article focus
[edit]As mentioned above, this article has a problem with vagueness. Right now it's titled "encryption software" but it contains assorted discussion about selection of encryption algorithms. Needs some work to decide what should be done with it. FT2 (Talk | email) 18:48, 8 December 2011 (UTC)
- Still needs work, in my opinion. Should there be a focus on commercially-available software, not just theoretical discussion? -- AstroU (talk) 04:28, 28 December 2014 (UTC)
- My opinion is that the article should primarily discuss where, when, why, and how encryption software is used. Examples of commercially-available software could be added, when appropriate, but I don't think they should be the focus. Maslen (talk) 16:11, 11 March 2015 (UTC)
Encryption Software -> Applications -> File and Directory (aka Folder) Encryption Article
[edit]As a newb to Wikipedia, and not knowing about this group, I attempted to begin improving content in this domain. First, by replacing a redirect of File/folder_encryption with an article about encrypting files and directories. Previously, the content lumped encrypting a file into Filesystem-level_encryption. The article was rejected, and when I began explaining the difference between file and file system encryption, I was directed to this group. Long story short, IMO Encryption_software should be about encryption software - first by categorizing the types of encryption software (encryption for data at rest, encryption for data in transit, etc.), and then by sub-categorizing (for example) data at rest into Disk_encryption (which appears to be a good article), Filesystem-level_encryption (which may need some work) and other types of software encryption that I discuss here: User_talk:Onel5969#Seeking_clarification_on_.22deleted.22_article. In short, the efforts of many Wikipediaer's may need to be reorganized a bit. Am willing to propose a plan and add content, if that will be helpful. User93454235 (talk) 14:13, 24 March 2017 (UTC)
Merger of Cycles per byte]
[edit]I merged in cycles per byte to this article per the discussion: Wikipedia:Articles for deletion/Cycles per byte
- Start-Class Cryptography articles
- Top-importance Cryptography articles
- Start-Class Computer science articles
- High-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles
- Start-Class Computing articles
- Unknown-importance Computing articles
- Start-Class software articles
- High-importance software articles
- Start-Class software articles of High-importance
- All Software articles
- Start-Class Computer Security articles
- High-importance Computer Security articles
- Start-Class Computer Security articles of High-importance
- All Computer Security articles
- All Computing articles