RE: RE: RE: [PHP] Mcrypt: Blowfish or Twofish or no fish? part 3

2002-05-23 Thread John Horton
gt; talking about. I'm aware that the data gets encrypted in > independed blocks and its easier to crack it, but its faster than > other modes. > > Tx, > Vinod. > > On Wed, 22 May 2002 John Horton wrote : > >why use AES? Blowfish can have a 448 bit key size! Also, why us

RE: [PHP] Mcrypt: Blowfish or Twofish or no fish?

2002-05-23 Thread John Horton
I was mixing up with the attack against twofish with reduced rounds (I think this is true of blowfish with reduced rounds as well ) -Original Message- From: Evan Nemerson [mailto:[EMAIL PROTECTED]] Sent: 22 May 2002 22:57 To: John Horton; [EMAIL PROTECTED] Subject: Re: [PHP] Mcrypt

RE: [PHP] PHP & PGP

2002-05-22 Thread John Horton
calculate a hash of the pass the user enters and store that. When the user enters a pass again to get the data, then hash this pass and see if it matches the stored hash. If it does , then send the user the data. create a table that stores username, and hashed passwords for authentication. HTH --

RE: RE: RE: [PHP] Mcrypt: Blowfish or Twofish or no fish? part 3

2002-05-22 Thread John Horton
: John Horton Cc: [EMAIL PROTECTED]; Jimmy Lantz Subject: Re: RE: RE: [PHP] Mcrypt: Blowfish or Twofish or no fish? part 3 And why not use AES, which is an industry standard and having being proven as the best encryption algorithm in recent times? http://csrc.nist.gov/encryption/aes/aesfact.html As

RE: RE: [PHP] Mcrypt: Blowfish or Twofish or no fish? part 3

2002-05-22 Thread John Horton
why use AES? Blowfish can have a 448 bit key size! Also, why use ebc mode with all the problems which come with it? JH -Original Message- From: Vinod Panicker [mailto:[EMAIL PROTECTED]] Sent: 22 May 2002 10:06 To: Jimmy Lantz Cc: [EMAIL PROTECTED] Subject: Re: RE: [PHP] Mcrypt: Blowfish o

RE: [PHP] Mcrypt: Blowfish or Twofish or no fish? part 3

2002-05-22 Thread John Horton
File hashing is used to take a hash of the clear text. In this way, you can append the hash to the encrypted text. When decrypting, you remove this hash, decrypt the rest of the file, hash this decrypted file and see if the two hashes match up. If they don't then an incorrect key was used with the

RE: [PHP] Mcrypt: Blowfish or Twofish or no fish?

2002-05-22 Thread John Horton
Hi, I believe that twofish has been successfully broken, so use blowfish instead. Typically, for encrypting files you will use an algorithm like blowfish in cbc mode (as opposed to ebc mode) but I don't know if Mcrypt supports this. Also, when creating the hash of the file, it is probably best to

RE: [PHP] Plz dont hate me for this

2002-05-16 Thread John Horton
Hi, Also try www.uklinux.net They have php and perl cgi (with a mysql or postgres backend) -Original Message- From: Salman Ahmed [mailto:[EMAIL PROTECTED]] Sent: 16 May 2002 03:05 To: PHP List Subject: [PHP] Plz dont hate me for this Hi, I am also PHP lover plz dont hate me for this bu

[PHP] byte order of integers

2002-05-15 Thread John Horton
Hi! Is there any way of decomposing an integer into it's constituent bytes so that a new byte order can be created? tia JohnH John Horton Software Engineer BITbyBIT International Limited [EMAIL PROTECTED] Tel: + 44 (0) 1865 865400 Fax: + 44 (0) 1865 865450 www.bitbybit.co.uk Discl