Need help in cryptography, C programming [closed] - c

As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 11 years ago.
I have developed a sample code that does AES-256 Encryption. It takes a key, and using that key it can encrypt and decrypt message. Now I want to implement key sharing mechnaism.
Which Key-sharing algorithm is the best, and fits in this scenario.
Also please tell me which cryptography is best(asymmetric or symmetric).
Thanks,
Pawan

I have developed a sample code that does AES-256 Encryption
I hope this will not become production code. I bet your implementations has a ton of side channels allowing for key extraction.
Which Key-sharing algorithm is the best, and fits in this scenario.
That strongly depends on the application in question.

Related

write my own delta compression? [closed]

As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 9 years ago.
Is there any reason that I absolutely should not write my own delta compression library (in C)? I'm working on proprietary project and cannot include any GPL'd code (and most others in fact).Being not an expert in binary data compression, I'm wondering if I do go this way, where should I start? All data involved is highly patterned binary with roughly the same length (~100K).
Sorry for the rather vague question.. Thanks in advance for any insight
Zlib is freely available and reusable, even in proprietary software. (Here is the license.) There is no reason to try and recreate it.

Database normalization made easy? [closed]

As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 9 years ago.
Is there any easy resource available online or a book which would allow a complete newbie how the database normalization process works and what one should do to perform the transformations on a given database leading it from 1NF to 5NF through all the in-between?
From my research, it seems that the Wikipedia article seems to be the closest to what I'm looking for but is there anything even easier?
This highly depends upon your taste. But I have found that the course in class2go offered by Stanford is quite good. It has a fairly good explanation of normalization up until NF4. For a complete newbie I think this would be quite useful.
You have to sign up but the material is supposed to be there:
http://class2go.stanford.edu/db/Winter2013
Also have you seen this?
http://www.bkent.net/Doc/simple5.htm

Creating a simple HTTP proxy in C [closed]

As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 10 years ago.
I'm a newbie programmer looking to create a simple proxy in C that forwards HTTP requests (through TCP). Are there any resources online that can get me started? I've already looked at "Beej's Guide to Network Programming" as it came highly recommended, but I find it to be a little incomplete and hard to follow. Any suggestion would be appreciated!
Why reinventing the wheel?
There is tinyproxy that is fully featured, opensource and free.
https://banu.com/tinyproxy/

how does data mining technique AdaBoost work? [closed]

As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 10 years ago.
I came across the data mining technique AdaBoost but i can not find much information regarding how it works or any examples i can go through, can someone please shed some light in this area?
Also i would like to give prediction and exploration of data a try, does anyone have any examples?
This tutorial explains the idea very well. At the end of the tutorial, in section Problems, item 4 points you to a simple classification problem which you can try, and item 5 points you to the code of the implementation of the Viola-Jones algorithm in the
OpenCV library. Its object detection framework employs a variant of the AdaBoost to both select the best features and to train classifiers that use them.

Is there a preferable programming language for CGI apps? [closed]

As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance.
Closed 10 years ago.
I know that I can write CGI in many languages, the most are C and Perl.
But why I have to write it in Perl or in C?
What's the difference and what's the (eventually) the best and safe solution?
The advantage of nearly all dynamic languages over C is that it's much harder to get buffer overflows while doing string manipulation, which can easily become a security problem.
Also Perl has libraries that help you dealing with the CGI protocol, and they are battle tested and stable.

Resources