-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
The approach should be:
Create a bunch of symetric keys (keep them in your process memory -
anyone with root access or same user might still be able to capture them)
save those sym-keys into your db protected by a PubKey (also called
a KeyEncrypti
On Wed, Feb 23, 2011 at 1:03 AM, H. Phil Duby wrote:
> On Tue, Feb 22, 2011 at 9:07 AM, Philip Graham Willoughby
> wrote:
> >
> > On 22 Feb 2011, at 15:41, Max Vlasov wrote:
> > > The obvious solution is public-key cryptography. The question is about
> > > different ways how it could be implement
On 22 Feb 2011, at 22:03, H. Phil Duby wrote:
> On Tue, Feb 22, 2011 at 9:07 AM, Philip Graham Willoughby
> wrote:
>>
>> On 22 Feb 2011, at 15:41, Max Vlasov wrote:
>>> The obvious solution is public-key cryptography. The question is about
>>> different ways how it could be implemented with sql
On Tue, Feb 22, 2011 at 9:07 AM, Philip Graham Willoughby
wrote:
>
> On 22 Feb 2011, at 15:41, Max Vlasov wrote:
> > The obvious solution is public-key cryptography. The question is about
> > different ways how it could be implemented with sqlite. The requirement for
> > this system is that it sho
On Tue, Feb 22, 2011 at 7:07 PM, Philip Graham Willoughby <
phil.willoug...@strawberrycat.com> wrote:
> On 22 Feb 2011, at 15:41, Max Vlasov wrote:
> > The obvious solution is public-key cryptography. The question is about
> > different ways how it could be implemented with sqlite. The requirement
Public-key encryption is not designed as a method to encrypt data, it is meant
as a means to prove a digital signature and to prevent man in the middle
attacks.
Web servers do use public keys but only to encrypt the symmetric key that is
used to encrypt the actual data traffic.
You will want t
On 22 Feb 2011, at 15:41, Max Vlasov wrote:
> The obvious solution is public-key cryptography. The question is about
> different ways how it could be implemented with sqlite. The requirement for
> this system is that it should operate in two modes:
> - insert-only when no reading operation is used.
Hi,
recently I was thinking about a system when logs about something are written
encrypted without interaction with the user, but for reading the contents
one would need the key.
The obvious solution is public-key cryptography. The question is about
different ways how it could be implemented with
8 matches
Mail list logo