View previous topic :: View next topic |
Author |
Message |
benlue Moderator Reputation: 0
Joined: 09 Oct 2006 Posts: 2142
|
Posted: Tue Mar 13, 2007 12:27 am Post subject: Encryption Information |
|
|
Encryption uses the "ASCII code".
Encryption requires a bit of mathematical skills and a little bit of memory .
Conversions using visual basic:
Asc - Changes things to one characters.
Chr- Changes to Characters .
Keys are important in encryptions due to the fact that they store the functions .
Code: | Private function ParseandEncrypt(string as string)
dim count as integer \\Declare the variable for the loop
dim Char as string \\Declare the variable for the character
dim newString as string \\Declare the variable for the new string
dim newASCII as integer \\Declare the variable for the new ASCII code
for y = 0 to 127
arrayKey(x) = (rnd*9)
next y
for count = 1 to len(string) \\Loop from 1 to the length of the string
Char = mid(string,count,1) \\Start with the character at the 'count' position and go one unit
newASCII = asc(Char)+arrayKey(x) \\Add the ASCII number to a random number 0-30
newString = newString & chr(newASCII) \\Convert to regular character format and add to the new string
x = x + 1
if x > 127 then x = 0
next count 'Loop again
ParseandEncrypt = newString \\Return the new string
End Function
|
That's an encryption .
Anything i did wrong there please point out so i can fix . Encrpytion was learnt a long time ago so this might be outdated as it came from what i remembered .
Anyway enjoy !
|
|
Back to top |
|
|
flawedmatrix Grandmaster Cheater Reputation: 0
Joined: 21 Jun 2006 Posts: 819 Location: 14598622 for yourself...
|
Posted: Tue Mar 13, 2007 1:09 am Post subject: |
|
|
Hmm, well you should tell the difference between a strong encryption and a weak encryption. Well, I am more familiar with Delphi's syntax.
_________________
|
|
Back to top |
|
|
benlue Moderator Reputation: 0
Joined: 09 Oct 2006 Posts: 2142
|
Posted: Tue Mar 13, 2007 1:31 am Post subject: |
|
|
That's a weak encryption . Can be made stronger easily by adding some random things in .
|
|
Back to top |
|
|
flawedmatrix Grandmaster Cheater Reputation: 0
Joined: 21 Jun 2006 Posts: 819 Location: 14598622 for yourself...
|
Posted: Tue Mar 13, 2007 2:34 am Post subject: |
|
|
Also, try to list some strong/moderately strong methods such as using bitwise operators (xor, shr, ...). You can also try to make clear the concept of hashes and message digests, such as sha1 and md5.
By the way, this is optional. It's just relevant to encryption.
_________________
|
|
Back to top |
|
|
|