Do you think I could just leave this part blank and it'd be okay? We're just going to replace the whole thing with a header image anyway, right?
You are not logged in.
Pages: 1
Hello,
My project of yesterday is a program to encrypt and decrypt texts.
You can use 3 "modes" for it, each one is required to decode the text correctly.
Link is there --> .
How to use it:
- Start the program
- type in "1" if you want to encode (encrype) the text, else type in "2"
- enter 3 modes in the range of 5 - 50 (remember them)
If you want to enyrype your text then {
- enter text to encrype and press enter
- click on the little icon of the application (left, top)
- select "Edit" -> "Mark"
- select the encryped text to copy with you mouse
- hit enter
- send to the person who should recrive it
- send also the modes if he/she doesn't know them
} else {
- click on the little icon of the application (left, top)
- select "Edit" -> "Paste"
- hit enter
- look at output text
}
You need to run it:
- .NET Framework 3.5
- Win XP or more
How it works:
This program converts every char to a number and that number gets added/subtracted by another, those who got defined in the modes.
To all other programmers: You can decopile my application with IlSpy, Dis-C# or .Net Reflector to see how it really works. I think I get the creator rights of it? Well, You are allowed to copy those codes if you learn from them.
If you think it's a good program, then I would be really happy if you would give me a +Rep
Else, if your sceptic: check the file with your Antivirus program - it's virus free
Please don't reply to this while the forums are down, thx. (PM me?)
[EDIT1] The system works also backwards - decode the orginal text then encode it
Last edited by Krock (May 21 2013 10:17:21 am)
Please note guys, this is not a secure way to encrypt text, It is merely for fun I assume.
Last edited by Cyral (Jun 6 2013 10:56:10 am)
Player Since 2011. I used to make bots and stuff.
Offline
For practical use this wouldn't be so good, anyone could bruteforce the 'modes'.
I suggest using a key to generate a hash, you could also possibly take advantage of userID.
Overall, I don't think EE would have much to help with the process. There isn't many two-way systems.
*u stinky*
Offline
Pages: 1
[ Started around 1738850113.5616 - Generated in 0.067 seconds, 12 queries executed - Memory usage: 1.4 MiB (Peak: 1.51 MiB) ]