Kee, What asymmetrical encryption do you use with LiveCode?

--
 Richard Gaskin
 Fourth World Systems
 Software Design and Development for the Desktop, Mobile, and the Web
 ____________________________________________________________________
 ambassa...@fourthworld.com                http://www.FourthWorld.com


kee nethery wrote:

I have an app that passes private data from it to me. If you were to do the 
same (except you are going from you to your app):

Create a public/private key. Embedded the public key in your app and use it to 
decrypt the symmetrical key used for the encryption of the actual data. (A 
public/private key encodes with one key, and decodes with another.)

Create a hash of the stack (or script). Basically get a fingerprint of the file 
before you start encrypting it. Use that fingerprint to make sure that when 
your stack decrypts it, you got what you were sending.

Create a unique key for each stack (or script) that you plan to encrypt.
Encode the stack (or script) with a symmetrical algorithm using that key. (A 
symmetrical algorithm has the same key used to encode and decode.) Symmetrical 
algorithms are much faster than public/private algorithms.
Convert the symmetrically encrypted data to base64. Makes it simple ASCII 
characters.

Take the symmetrical key, the hash, and the file name, combine into a set of 
structured data, and encrypt that data using your private public/private key 
(the key that only lives on your computer). This is a small set of data and it 
will encrypt quickly.

Convert the public/private key encrypted data to base64. Combine the two base64 
sets of data into a single structured text file.

Zip that text file and send it to your receiving stack.

Your receiving stack would have your public key embedded in it. When it grabs 
the zipped up file it reverses the process:
unzip the file,
pull the two base64 sets of data apart,
un-base64 both sets of data,
use the public key to decrypt the symmetrical key, hash, and end result file 
name
decrypt the stack (or script) data,
name the file correctly,
fingerprint the data
compare to the fingerprint you created and sent with the file you received
If the fingerprints match, use the file.

Not sure which algorithms are recommended these days. Know that MD5 is not 
recommended. You can pick really big keys since the symmetrical algorithm is 
quick and the public/private algorithm will be working on a very tiny set of 
data.

Kee Nethery

_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode

Reply via email to