Search found 593 matches

by paulej
Sat May 07, 2011 9:56 pm
Forum: AES Crypt
Topic: Problem with cross compile on ARM processor
Replies: 3
Views: 5851

Re: Problem with cross compile on ARM processor

Tim, I haven't, but I was thinking somebody had done that before. I just don't recall who, but I was thinking somebody contacted me about doing that once. If memory serves, they were having issues with the ASCII/Unicode conversion. I'm really not sure what to suggest. It doesn't make sense that one ...
by paulej
Fri May 06, 2011 6:14 pm
Forum: AES Crypt
Topic: Problem with cross compile on ARM processor
Replies: 3
Views: 5851

Re: Problem with cross compile on ARM processor

Tim, I'm not sure what to suggest. As you know, AES Crypt does nothing more than open a file, encrypt it, and write out the encrypted file (and vice-versa). It never attempts to access other files. AES Crypt is highly CPU intensive, though. Perhaps when you start it, it's consuming all of the availa...
by paulej
Thu Apr 28, 2011 4:52 pm
Forum: H.323 (Packet-Switched Multimedia Systems)
Topic: H.323 vs. SIP
Replies: 10
Views: 37891

Re: H.323 vs. SIP

vipeenexy, Not sure. Perhaps if you detailed some of the course requirements it might help. Since you did not say "multimedia communications" then I would guess what you might be studying is multimedia like computer graphics, animation, etc. Alas, it is very hard to say what you would be l...
by paulej
Thu Apr 28, 2011 1:56 am
Forum: AES Crypt
Topic: Encrypt/Decrypt from Mac clipboard?
Replies: 1
Views: 4628

Re: Encrypt/Decrypt from Mac clipboard?

AES Crypt only does file encryption.
by paulej
Tue Apr 26, 2011 1:51 pm
Forum: AES Crypt
Topic: anyone know how to make it from java?
Replies: 2
Views: 5241

Re: anyone know how to make it from java?

There is a Java version of AES Crypt. It does not have a GUI, so that development work would need to be done.
by paulej
Sun Apr 24, 2011 3:37 am
Forum: AES Crypt
Topic: Password to Symmetric Key Algorithm ???
Replies: 2
Views: 7465

Re: Password to Symmetric Key Algorithm ???

Steve, The Windows code uses a stronger algorithm for generating random numbers, in theory. It is the random number generator provided by MS as a part of the crypto APIs. On Linux, the code presently uses /dev/urandom. This may include less entropy than is ideal, but we try to balance that by hashin...
by paulej
Wed Apr 06, 2011 7:24 am
Forum: AES Crypt
Topic: changeing S-Box
Replies: 2
Views: 6444

Re: changeing S-Box

Can you tell me what you are referring to? Something specific to the AES algorithm itself, or something to block cyphers in general? Either way, I can't provide an answer :-)
by paulej
Tue Mar 29, 2011 4:27 pm
Forum: AES Crypt
Topic: decryption of files to recover
Replies: 7
Views: 11428

Re: decryption of files to recover

That's an interesting use case. I had seen that with trucrypt, too. That tool even goes so far as to allow one to create hidden volumes, which I assume nobody would necessarily know was there. I suspect I could determine if there as cryptographic data, though. One technique would just be to look at ...
by paulej
Mon Mar 28, 2011 2:10 am
Forum: Audio Codecs
Topic: G.711.0 - Compressed G.711
Replies: 5
Views: 45126

Re: G.711.0 - Compressed G.711

Not yet. A payload specification must first be defined in the IETF. Once that is done, then we could use it in H.245 and SDP. This specification is being written right now.
by paulej
Mon Mar 28, 2011 2:08 am
Forum: AES Crypt
Topic: decryption of files to recover
Replies: 7
Views: 11428

Re: decryption of files to recover

Doing this has two apparent drawbacks without any apparent advantages. Firstly, this effectively proves that the file is ciphertext as opposed to random data. Secondly, it means that the ciphertext cannot be decrypted by any program other than AES Crypt without surgery on the raw file. Prepending A...