- Total Source Code 3
- Total Page : 1
- You currently on page number : 1
- 30 December 2013
The security of any good cryptosystem relies on the key. No matter how large a key, there will be an imposing decrease in security if it is poorly used by the software. Keys should be measured according to the bits of entropy contained within them, and simple keys should be disallowed. They should contain many different characters, and have no discernable patterns. Only when these conditions are Read more
- 16 January 2014
This two functions are used to encrypt and decrypt text.
Here's how to use it:
The four entries Key1, Key2, Key3 and Key4 are numbers that can range from 1 to 120.
In order to decrypt a text, you must use the same numbers you used to encrypt the text.
No one that doesn't know what values were used on Key1, Key2, Key3 and Key4 will be able
to decrypt your text!
Note that Key1*Key4 MUST be Read more
- 00 0000
webpage, but for those who do not have access to a CGI-BIN, it may very well be the only
out at least the average surfer, I've created this encrypted password generator. This
program dynamically encrypts the password to a page (differently each Read more