Guardian Digital Inc. >
Mailing List Archives >
Full Disclosure Mailing List Archive
Have you considered using secured network protocols on dedicated
encryption hardware? or is that beyond the price point?
Any cipher algorithm would be theoretically implementable (providing
the length of data is suitable). If you are looking for _real_
performance though then ciphering may not be what you want as there
isn't any good cipher that is really overly fast fast (deliberate
There are other core pieces of the puzzle to be considered though,
like are you going to be talking in a client less manner (i.e. is the
client pre-configured or has the client never received secure comms
before?) Is there a socket/tunnel already running? What is the rough
length of the data set (impact readability and suitability for
encryption algorithms)? What is the performance restriction (i.e.
where is the bottleneck)? How secure do you need it, anti-fool,
seconds, hours, years or millennial(might actually require more data
storage than money can buy)?
I raised an eyebrow at the last portion of your mail, "Is there a
freeware or software or information, I can check out?". This would
suggest that you are looking to put another program somewhere mid-flow
in a data pipe; thats not always a good option.
If you're really looking for speed and ease of implementation then
something like a simple rotation cipher might work out for you, but
this is going to be so poor a encryption that some cipher pro's could
read it in its encrypted form. This is obviously no good if you're
worried about credit card info, but is OK if it's just your girlfriend
being a nosy ....... .
On Tue, 14 Dec 2004 00:23:41 -0800 (PST), richard capistrano
> We are looking for a tool that can actually cipher or hash a particular
> portion of a file so that it will not display the particular field of a
> file. This will be applied to the file so that when it travels the network,
> the confidential field in the file is not displayed in clear text. Due to
> performance issues, we can not simply hash the whole file.
> Is there a freeware or software or information, I can check out? Thanks in
> Do you Yahoo!?
> Read only the mail you want - Yahoo! Mail SpamGuard.
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
Full-Disclosure - We believe in it.