I want to encrypt a whole data of a pdf file using blowfish algorithm. I feel password protection is not enough. The pdf can contain images text tables etc. The pdf will be a thesis of PHD student.
create cypher file from pdf file using python(i would like to use blowfish algorithm)
134 Views Asked by Anmol Singla At
1
There are 1 best solutions below
Related Questions in PYTHON
- How to store a date/time in sqlite (or something similar to a date)
- Instagrapi recently showing HTTPError and UnknownError
- How to Retrieve Data from an MySQL Database and Display it in a GUI?
- How to create a regular expression to partition a string that terminates in either ": 45" or ",", without the ": "
- Python Geopandas unable to convert latitude longitude to points
- Influence of Unused FFN on Model Accuracy in PyTorch
- Seeking Python Libraries for Removing Extraneous Characters and Spaces in Text
- Writes to child subprocess.Popen.stdin don't work from within process group?
- Conda has two different python binarys (python and python3) with the same version for a single environment. Why?
- Problem with add new attribute in table with BOTO3 on python
- Can't install packages in python conda environment
- Setting diagonal of a matrix to zero
- List of numbers converted to list of strings to iterate over it. But receiving TypeError messages
- Basic Python Question: Shortening If Statements
- Python and regex, can't understand why some words are left out of the match
Related Questions in ENCRYPTION
- Is TLS enough for client server encryption or if dealing with sensitive data, its better to add ur own encryption also. for example leverage AWS SSM?
- Secure Messaging Implementation in C#
- File splitting and encryption
- Large file processing in the web browser
- Java code of AES/GCM/NoPadding encryption algorithm with authentication tag
- AES-256-CBC encryption returning different result in Python and PHP , HELPPP
- Why are encrypted stored procedures taking a long time to execute in SQL Server 2022?
- Why/How does Apache auto-include "DHE" TLS1.2 ciphers while nginx needs "dhparams" file?
- Encrypt in Single Store and Decrypt in SQL Server
- Is it possible to develop a Transparent Data Encryption(TDE) system on macOS now?
- How can I ensure incremental changes in deciphered messages in Python substitution cipher decoding?
- Getting Error Message as "the input string is not a complete block" while Decryting using AES
- Laravel: How to fix "the MAC is invalid" on local environment
- How to encrypt a string and decrypt it using a password
- Willena's sqlite-jdbc-crypt driver for sqlite3 database encryption
Related Questions in FILE-HANDLING
- how to edit or update the values of records text file in python using seek and tell function
- How to handle a file handling code that shows no output after first time?
- Unexpected output due to file.readline() when using 'a+'
- how can I detect if a file is open by windows app in WSL and either overwrite or rename?
- Python Seek Function with an offset exceeding the file size
- FileOutputStream not closing properly?
- I'm trying to create an ai chatbot using electron and python. code is working properly but in js part their is problem
- PermissionError 13? Permission denied?
- Merging files on disk in Python
- Receiving multiples files from server
- My tkinter app wont change the file it is loading
- How does the serialisation using child class of ObjectOutputStream does not give error when reading the objects using ObjectInputStream?
- How can I test whether I can read or write a directory?
- Ruby Script Recursively Creates Deeply Nested Directories
- Changing the start address of the IntelHex file using Python
Related Questions in BLOWFISH
- Download Music From the URL using Python
- Display a blowfish encrypted file without vi(m)
- Python Blowfish encryption doesn't give same output as Blowfish.js
- How to check php.ini / php settings about crypting (BLOWFISH)
- py blowflish PY_SSIZE_T_CLEAN macro must be defined
- PyCryptodome Blowfish algorithm check value
- OpenSSL 3.0 command fail to setting cipher
- Why does blowfish code written in php give different results in Python?
- TCL Blowfish behavior
- How To Select A Hashed Value From A Postgresql Database With Pgcrypto and Python
- Convert Blowfish Encryption from Java to Python
- How to get a cipher of Blowfish/ECB/NoPadding using BouncyCastle in c#?
- Blowfish support in crypt python library
- create cypher file from pdf file using python(i would like to use blowfish algorithm)
- I need help resolving a Lazarus FPC Blowfish library usage problem
Related Questions in PYTHON-CRYPTOGRAPHY
- Are there poor practices in this use of python cryptography package to generate RSA keypair?
- Implementing RSA (not for practical use): Is there a limit to what numbers can be computed by Python (OR) Any other programming language?
- Decryption of a file using fernet module in python
- Using python cryptography to differentiate TLS1.3 rsa_pss_rsae_sha256 from TLS1.3 rsa_pss_pss_sha256 certificates
- How to Implement a Custom X.509 Path Validation Rule
- cryptography in python: Fernet key must be 32 url-safe base64-encoded bytes
- How to sign an OCSP request using a CloudHSM private key in Python
- pkcs12 extract cert and key from pfx file
- Reed solomon and mceliece in python
- string decryption in python cipher is not working
- How can I read the encryption key generated by cryptography.fernet from a yaml file as a string?
- Python 3.11 upgrade - lib64/libc.so.6: version `GLIBC_2.28' not found
- How to load binary data to x509 object?
- How to export a private key / public key into bytes with Python cryptography module?
- Can someone confirm if my code satisfies these questions?
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular # Hahtags
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
If you are worried that your file may be accessed by a malicious third-party then you should not attempt to implement your own algorithm. It is very easy to make a mistake that leads to security issues.
Also, you probably shouldn't be using the blowfish algorithm, which has some major security issues:
https://en.wikipedia.org/wiki/Blowfish_(cipher)#Weakness_and_successors
I would recommend using a well-established cryptography program that you can trust - something written by industry experts. It is unethical to store somebody else's private data using home-made encryption software that may or may not be secure.