Important alert: (current site time 10/23/2014 1:34:04 AM EDT)
 

winzip icon

RCA Encryption Class

Email
Submitted on: 5/9/2001 5:33:51 PM
By: Lewis E. Moten III  
Level: Advanced
User Rating: By 7 Users
Compatibility: ASP (Active Server Pages)
Views: 17387
author picture
(About the author)
 
     RCA is used for most standard public key/private key encryption techniques. Due to its burden on resources, RCA is generally used to encrypt random session keys wich are then used to encode messages with RC4. RCA also brings digital certificates into the picture. This, and many other "public" algorithms using RC4 do not truly make the message secure. Encryption is performed in 8 bit blocks - or 1 byte. Typing "AAAAAA", you will see a pattern begin for form with the encrypted data. If someone were to look at the results from encrypting each letter of the alphabet, your data would be compromized. Also, the public/private keys are limited between a range of 1 and about 65000. This is primarily a starting point if you want to enable a more secure encryption scheme, or you just want to learn more about it.

 
winzip iconDownload code

Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. Afterdownloading it, you will need a program like Winzip to decompress it.Virus note:All files are scanned once-a-day by Planet Source Code for viruses, but new viruses come out every day, so no prevention program can catch 100% of them. For your own safety, please:
  1. Re-scan downloaded files using your personal virus checker before using it.
  2. NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.

If you don't have a virus scanner, you can get one at many places on the net including:McAfee.com

 
Terms of Agreement:   
By using this code, you agree to the following terms...   
  1. You may use this code in your own programs (and may compile it into a program and distribute it in compiled format for languages that allow it) freely and with no charge.
  2. You MAY NOT redistribute this code (for example to a web site) without written permission from the original author. Failure to do so is a violation of copyright laws.   
  3. You may link to this code from another website, but ONLY if it is not wrapped in a frame. 
  4. You will abide by any additional copyright restrictions which the author may have placed in the code or code's description.


Other 102 submission(s) by this author

 


Report Bad Submission
Use this form to tell us if this entry should be deleted (i.e contains no code, is a virus, etc.).
This submission should be removed because:

Your Vote

What do you think of this code (in the Advanced category)?
(The code with your highest vote will win this month's coding contest!)
Excellent  Good  Average  Below Average  Poor (See voting log ...)
 

Other User Comments

5/11/2001 8:27:05 AMDoug Gaede

I ran the program overnight and received high values of 95375 (public), 64633 (private), 65017 (modulus). Each one was for a different key pair. So it appears it will generate 17-bit numbers (but still far below the 'secure' minimum of 1024). I'll see how high it can be tweaked. Good code! I have searched for over a year for an implementation of public/private key pair encryption in VB.
(If this comment was disrespectful, please report it.)

 
8/12/2002 6:53:02 PMSanx

Excellent work. For simple encryption tasks, where you just want to hide a password or form value from inquisitive eyes, this is perfect. Took a whole ten minutes to incorporate into my program. Thank you very much for sharing this with us.
(If this comment was disrespectful, please report it.)

 
9/10/2002 4:47:14 PMAlex Wied (PcExpert)

How do you figure out the number of bits anyway? How do you get them higher?
(If this comment was disrespectful, please report it.)

 

Add Your Feedback
Your feedback will be posted below and an email sent to the author. Please remember that the author was kind enough to share this with you, so any criticisms must be stated politely, or they will be deleted. (For feedback not related to this particular code, please click here instead.)
 

To post feedback, first please login.