Do you need "strong" crypto or can something simpler do for you? If youQuote:>Does anyone know of any third party software for encrypting security
>access code files? We have developed an executable but do not want to
>put the file in the EXE because users will be added on a regular
>basis. Any help is appreciated.
(String A) XOR (PassWord) = (String B)
(String B) XOR (PassWord) = (String A)
The function I wrote converted the ascii value of a character to binary,
converted the password first character to binary, dod an XOR at the
binary bit level, converted binary back to ascii and then stored the
resulting character. Since the same password (in my case a long phrase
that was very easy for ME to remember) is used both ways, a short
function can be used easily. I passed the function the string I wanted to
encode and a number which was the character position in the key to use as
a starting point. Each user had a person ID in the system which ended up
giving each their own starting point in the key. Later, I could decode
the encrypted data and determine WHO had stored it. This was NOT a
requirement of the system, only that a casual user not be able to see
anything meaningful and that one person could not decode certain
pieces of data stored by another in certain fields. I later modified the
field structure to add a few bits to not even show the data at all if the
user could not decode it. Again, not a requirement, but it cleaned up the
screen a lot.
--
Ralph
... and NO, I speak for no one else but me, myself and I, of course.
Ratz! "They" lost the contract! This address may no longer be in
service after 1600 PDT, June 16, 1995.
NetLib for Windows and DOS, has a set of encryption routines. You canQuote:>Does anyone know of any third party software for encrypting security
>access code files? We have developed an executable but do not want to
>put the file in the EXE because users will be added on a regular
>basis. Any help is appreciated.
Hope this helps.
Menachem
+----------------------------------+
| Menachem Bzian, CPA |
| Flash Creative Management, Inc. |
+----------------------------------+
: There are various libraries available depending on what you want to
: do. A library called CIPHER is available on CI$ will encrypt string
: values. NETLIB from pinnacle publishing allows .DBF encryption.
i also found it at lenti.med.umn.edu in /pub/foxpro.