Statistics: Posted by burger2227 — Mon Mar 03, 2008 3:12 pm
Statistics: Posted by Mac — Mon Mar 03, 2008 5:32 am
When I saw this I assumed the Enigma was the machine (hence WW2)well...can anyone make something like that "Enigma" code in ww2?
just a suggestion..i don't want it..but i think that's best encryption?
Statistics: Posted by Mac — Mon Aug 06, 2007 2:34 pm
Statistics: Posted by Patz QuickBASIC Creations — Mon Nov 20, 2006 5:48 pm
Statistics: Posted by Z!re — Mon Nov 20, 2006 4:56 pm
Statistics: Posted by Patz QuickBASIC Creations — Mon Nov 20, 2006 4:16 pm
Code:
CHR$(200)
Statistics: Posted by Z!re — Mon Nov 20, 2006 1:40 pm
Code:
CHR$(200)
? It doesn't work when you have the whole 256-character ASCII alphabet.Statistics: Posted by Patz QuickBASIC Creations — Mon Nov 20, 2006 9:03 am
Statistics: Posted by Z!re — Mon Nov 20, 2006 8:35 am
Statistics: Posted by nkk_kan — Mon Nov 20, 2006 8:15 am
OK, but it seems much less effective just to shift one letter to the right. And, with those adding ASCII values from passwords to a string seems much less effective. (BTW, I am trying to use this just as a general encryption method. The second method is much more effective than the first, especially since it parses the strings and has a slight defect (if you can spot it). Take that analytical programs!Depends on what you define as effective.
I mean it gets the job done, and if your entire goal is protect some.. less than sensitive data, then sure, it's effective.
As a simple and somewhat not accurate example, say you got the string:
11111111111111111111111111
And you encrypt it with the password:
123
And you end up with:
23423423423423423423423423
The repetition gives it away, and thats a simple example, a good crypto breaker can spot patterns even when you try to hide them, such as increasing the encryption value by 1 each cycle:
23434545656767878989090101
But like I said, if you just want to encrypt a highscore table, or some data for a game or other such non-sensitive data, then this is fine.
Statistics: Posted by Z!re — Sat Nov 11, 2006 12:01 pm
Statistics: Posted by Patz QuickBASIC Creations — Fri Nov 10, 2006 4:26 pm
Statistics: Posted by Z!re — Fri Nov 10, 2006 9:37 am
Code:
SUB PatzCrypt (InFile$, OutFile$, Password$)FirstHandle = FREEFILE OPEN InFile$ FOR BINARY ACCESS READ AS #First HandleSecondHandle = FREEFILE OPEN OutFile$ FOR BINARY ACCESS WRITE AS #SecondHandleDO Crypt$ = INPUT$(4096, #FirstHandle) FOR A = 1 TO LEN(Crypt$) MID$(Crypt$, A, 1) = CHR$(ASC(MID$(Crypt$, A, 1)) XOR ASC(MID$(Password$, 4096 MOD LEN(Password$) + 1, 1))) NEXT A PUT #SecondHandle, ,Crypt$LOOP UNTIL LEN(Crypt$) <> 4096CLOSE #FirstHandleCLOSE #SecondHandleEND SUB
Statistics: Posted by Patz QuickBASIC Creations — Fri Nov 10, 2006 8:53 am
Statistics: Posted by Z!re — Thu Nov 09, 2006 11:03 pm