• Home
  • Script library
  • AltME Archive
  • Mailing list
  • Articles Index
  • Site search
 

AltME groups: search

Help · search scripts · search articles · search mailing list

results summary

worldhits
r4wp6
r3wp5
total:11

results window for this page: [start: 1 end: 11]

world-name: r4wp

Group: Rebol School ... REBOL School [web-public]
caelum:
16-Apr-2012
I have the SDK (full encryption strength) and I've been playing with 
the rijndael encryption algorithm. I cut and pasted the code below 
from http://www.rebol.com/how-to/encrypt.htmland it produces 256 
as the port strength despite the strength being stated as 512. Is 
it 256 or 512? The web page says Rebol can provide 512 with rijndael. 
Can it?

port: open [
    scheme: 'crypt
    direction: 'encrypt
    key: akey
    strength: 512
    algorithm: 'rijndael
    padding: true
]
print port/strength


When I switch the algorithm to blowfish I get the expected 512 port 
strength. Is blowfish actually 512?

I need to know what level of encryption I am working with. TIA.
caelum:
16-Apr-2012
That makes sense. The strength: 512 in the code misled me to believe 
it should be possible.


The blowfish algorithm works fine, but I presume it actually uses 
a key of 448 bits and not 512. https://en.wikipedia.org/wiki/Blowfish_%28cipher%29. 
In which case the value returned by the print port/strength is deceptively 
wrong when I test it with blowfish? Or am I missing something?
PeterWood:
16-Apr-2012
The final paragraph of the section titled the algorithm in the wikipedia 
enttyr for Blowfish explains that it is possible to implekment the 
algorithm with keys of up to 576 bits long but not advised by the 
author of the algorithm. Though when I was using REBOL for some testing, 
I set the strength to 448. 


I would have thought that AES 256 would suffice for for most purposes 
needing symmetrical encryption
caelum:
2-Feb-2013
Thanks BrianH. I am aware of the need to "keep your untrustworthy 
data that you can't safely DO separate from that code."


I am creating a small Rebol server capable of communicating with 
clients, using RSA key exchange and the blowfish algorithm, both 
of which work to reasonably high encryption levels in Rebol, 4096 
for RSA and 512 for Blowfish (yes I know the effective upper limit 
for Blowfish is 448 bits, but that is good enough for my purposes).


I want to save the RSA key as a block so it can be loaded back into 
the program and used again, hence my question. It will be encrypted, 
wherever it gets saved, so there will be no chance of it being messed 
with.


Actually, I am writing a much simpler version of Rebol Services, 
since I could not get that to work and my ability to code in Rebol 
was not sufficiently developed yet to see how to get it working.


I am in a steep learning curve right now with Rebol and the time 
I am investing is starting to pay off. Thanks for the information 
about keeping code and data separate. It's always good to be reminded 
of 'obvious' truths.
caelum:
2-Aug-2013
When R3 was open sourced, I presume the SDK was not also open sourced? 
I am looking for the 'C' source code for the RSA, AES and Blowfish 
encryption functions.
Arnold:
2-Aug-2013
To find source codes, you will need to search with google or so. 
"blowfish source code c" first result looks promising http://www.schneier.com/blowfish-download.html

world-name: r3wp

Group: Core ... Discuss core issues [web-public]
Allen:
2-Nov-2006
Encloak  -- http://www.rebol.net/cookbook/recipes/0023.html-- Carl 
says


Newer versions of REBOL include "cloaking" functions for encrypting 
and decrypting strings. These functions do not provide full strength 
encryption such as Blowfish, AES, or RSA as found in REBOL/Command, 
nevertheless they can be useful for hiding passwords and other values. 
(That's why we call it cloaking rather than encrypting.)
Group: SDK ... [web-public]
Rondon:
14-Jan-2012
http://user1.matsumoto.ne.jp/~goma/js/blowfish.html
Group: DevCon2005 ... DevCon 2005 [web-public]
Romano:
3-Oct-2005
i f i find some time, i will implement the blowfish algorithm a lot 
pmore complex than arc4, can be a good test.
Group: Tech News ... Interesting technology [web-public]
Reichart:
16-Dec-2010
That was a very funny pun on Blowfish :)
Group: Core ... Discuss core issues [web-public]
PeterWood:
1-Apr-2011
If I remember correctly, I was also able to exchange test data that 
was Blowfish encrypted with REBOL but I handled the padding myself:

plain: to binary! text
  
len: remainder length? plain 8

  if 0 < len [

    padding: 8 - len

    insert/dup tail plain to char! padding padding
 
  ]