LabVIEW

cancel
Showing results for 
Search instead for 
Did you mean: 

Simple Encryption Using Labview


@Binnu wrote:

Please provide me the algorithm.


There are many known encryption algorithms, just do a web search. An algorithm is independent of any programming language, so why are you posting in the LabVIEW forum?

Once you decide on an algorithm, you can try to implement it in a programming language of your choice as a good exercise. Is that what you are trying to do?

0 Kudos
Message 21 of 30
(1,909 Views)

I want to know the algorithm used in this code.Tell the name of the algorithm and I will read about it in wikipedia.I

Thank you.

0 Kudos
Message 22 of 30
(1,897 Views)

I want to know the algorithm used in this code.Tell the name of the algorithm and I will read about it in wikipedia.

Thank you.

0 Kudos
Message 23 of 30
(1,896 Views)

That looks like "security through obscurity" to me.

 

Have you looked my my example? I know it's not perfect but at least you can understand how it works just by looking at it.

https://forums.ni.com/t5/LabVIEW/Can-you-give-me-some-suggestions-for-encryption-decryption/m-p/2529...

 

========================
=== Engineer Ambiguously ===
========================
0 Kudos
Message 25 of 30
(1,885 Views)

I'm happy you clarified that this "encryption" algorithm is meant as a learning experience for you.  As an algorithm for encryption, it is relatively poor -- please do not use it yourself for anything you really need to keep secure.  There are much better (and mostly free, and mostly convenient) algorithms out there.

 

But you want to know about your LabVIEW Style.  Here are some suggestions:

  • A Picture is worth a Thousand Words.  But Documentation is Still Useful.  Every VI should have an entry in Description telling at least what the Inputs and Outputs are, and something about what it does.
  • There's a lot of "magic" going on in your main Block Diagram.  Another place some Description would be helpful (or encapsulation of code in another sub-VI, named for the "purpose" of the code, a short-cut to "self-documenting VIs").
  • To make Self-documenting VIs work, every VI needs an Icon that conveys information.  So black letters on a dark green background are out (not readable).
  • It really does help to try to standardize on the 4-2-2-4 Connector Pattern for all sub-VIs.  The lower corner connectors should be reserved for Error In and Error Out, and every VI should use it.  (This is an example of a Rule that all beginners should follow, and all experts should know when to ignore it).
  • Every LabVIEW Project (such as "Encryption" should start by clicking "New Project".  Learn to use LabVIEW Project for (almost) everything, especially anything involving Hardware (DAQmx, LabVIEW Vision, LabVIEW Real-Time, etc.).

Bob Schor

 

Message 26 of 30
(1,868 Views)

Hi dude

Let me be honest,I do not know anything about labview.My faculty insisted me to do encryption and decryption  project in labview. I know its weird.But there is nothing much I can do in this short span of time please try to explain me what is going inside your block diagram so that I can explain to my mam and will not get fail in project review,atleast a rough idea of how the file is encrypted and how it is decrypted. So that I will be able to understand it clearly when I see code.

Waiting for your reply.

Thanks in advance!

 

0 Kudos
Message 27 of 30
(1,832 Views)

I'm no dude and I do not do homework for people who should have done that for their own grades.

Rolf Kalbermatter  My Blog
DEMO, Electronic and Mechanical Support department, room 36.LB00.390
0 Kudos
Message 28 of 30
(1,826 Views)

Well I am feeling generous this morning so I will give you a few hints on what to do...

 

Encryption is done by XOR a repeating "key" and your data byte by byte.

 

Convert your key to a U8 byte array

Convert your data to a U8 byte array

XOR these two byte arrays an element (byte) at a time repeating the "key byte array" as many times as it takes.

Save the encrypted output to a file 

 

Decryption is the reverse XOR the same repeating key with the encrypted data byte by byte.

 

========================
=== Engineer Ambiguously ===
========================
Message 29 of 30
(1,806 Views)

Thanks for your concern 🙂  .It helped me!! Thank you so much.

0 Kudos
Message 30 of 30
(1,783 Views)