1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Encryption and Secure Deletion

Discussion in 'Software Development' started by Alphabeta525, Jan 9, 2019.

Advertisement
  1. Alphabeta525

    Alphabeta525 Thread Starter

    Joined:
    Jan 9, 2019
    Messages:
    4
    Hello! I was hoping to get some pointers on how to build my own encryption software that would also be able to securely delete the encrypted file if the password was entered wrong. I want to use 256 aes or similar encryption and possibly a 25 or more overwrite deletion. Long story short I'm proving to a friend that it can be done and I was figuring if I'm gonna take the time to make said program I might as well make it good.
     
  2. lunarlander

    lunarlander

    Joined:
    Sep 21, 2007
    Messages:
    9,212
    So you want to delete a file that was encrypted so that the user will never be able to recover it? Sorry we don't help with hacking activities like that.
     
  3. Alphabeta525

    Alphabeta525 Thread Starter

    Joined:
    Jan 9, 2019
    Messages:
    4
    Uhmm not hacking at all. It's my own file that I wish to encrypt. As stated I just want to learn what it takes to make a program to encrypt and also a program that does security measures for wrong passwords. How on earth is that hacking?
     
  4. Johnny b

    Johnny b

    Joined:
    Nov 6, 2016
    Messages:
    3,474
    First Name:
    John
    Doesn't sound practical to me.
    One wrong character used in decrypting and the file is lost.
    And I'd be missing quite a few by now :D

    If you are worried about attempted cracking, simply use a more complex key and/or more powerful encryption.

    You would need to write something better than veracrypt if you intend a do-it-yourself attempt at encryption, and I strongly suspect that would be an intense attempt even for expert coders.
     
  5. Johnny b

    Johnny b

    Joined:
    Nov 6, 2016
    Messages:
    3,474
    First Name:
    John

    You are new here and we don't know you.
    Incorporate that concept into ransomware and it's no longer an innocent application.
     
  6. Ent

    Ent Trusted Advisor

    Joined:
    Apr 11, 2009
    Messages:
    5,466
    First Name:
    Josiah
    Others have already said that we can't help you do that, and I'm not here to contradict that.

    However, for reasons of education I thought it's worth mentioning one thing. In general, when we're designing encryption software, we want something that is secure against someone who has all the advantages except the password/key. This is Kerckhoff's principle: A cryptosystem should be secure even if everything about the system, except the key, is public knowledge. That is, they know what encryption you're using, how your software works, what your encrypted data is (although obviously not what the unencrypted one looks like!) and so on.

    Against such an adversary, what you are suggesting cannot actually be reliable, because they can always replicate your system without the defences. For example, they could use their own 256 aes decrypter which doesn't have the deletion code in place. Or they could just make a copy of the file (or the whole hard drive) before they guess the password!

    However, you don't need to worry too much, since brute forcing an AES key would take longer than the whole universe has existed for! The bit that you are allowed to assume the attacker doesn't control is enough that you don't have to worry about panic deleting.
     
  7. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Short URL to this thread: https://techguy.org/1221606

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice