Home > Net >  For file encryption and executed
For file encryption and executed

Time:03-02

Usage scenario is: first, through the tools or c # code for the specified file encryption, then can through own management software or c # code to open the file, not by any other means or perform this alone the encrypted file,
Before didn't do this, don't know what is the solution, the great god, please give some advice

CodePudding user response:

Any file can be converted into a binary stream, can first will be stored in the encrypted files in binary stream. To decrypt the files in binary stream reads out first, and then decrypt.

CodePudding user response:

For file encryption and decryption, through its own management software this is not a normal encryption demand,

Normal encryption, is your encryption, user interface, the user has its own key, is to solve the transmission by leakage problem,

What you need is to limit others open their files, no matter how encryption, key if there is only one, always very easy to break, because you must ultimately want to decrypt,

CodePudding user response:

His research a kind of encryption method, and then perform operation, it is best to grasp the key by the user

CodePudding user response:

There are some things we don't know meaning, such as "and then can through own management software or c # code to open the file, not by any other means or perform this alone the encrypted files",
1. Can't open the -- -- -- -- -- -- -- mean? Cannot use notepad to open it, or open the code
2. Cannot be alone or by any other means to perform this encrypted file -- -- -- -- -- -- -- -- to perform? He didn't what is encrypted before? Is an executable file or a executable file

This thing, but can small, you decide you want to further the meaning of content,
1. An MDB suffixes can use the open Access, for example, with other can't open (of course, if other exe special support can open), so this is normal development, the main technology is: the file format, file associations
2. He can run, so he is PE file, just have a shell, and the shell can only use your software to unlock, so under normal circumstances is to write encrypted drive (Minifilter)

So we don't want to mess with rhythm, so you'd better write good meaning, so that once ran to the "transparent encryption" (Minifilter minihook) this kind of unconventional development


CodePudding user response:

collection reference 3 floor expert replies:
research a kind of encryption method, and then perform operation, it is best to grasp the key by the user


Document are the users themselves? I feel the key is not encrypted. The encryption algorithm has a lot of, the key is "open", such as word file encryption, can office to open the edit save as is open? Or can only see in your own software?

CodePudding user response:

Executable file is normal (is understood as a shell), but by my platform to bypass or through the shell and password, so the user is actually non-inductive, just open the way not directly execute the exe, but by my platform invoke, but if the document on the separate direct execution requires a password, is equivalent to an open platform manages the executable executive power,
  •  Tags:  
  • C#
  • Related