Do you have a question? Post it now! No Registration Necessary. Now with pictures!
- Mok-Kong Shen
April 21, 2015, 1:59 pm
rate this thread
The software is available at:
For constructive critiques and comments I should be very grateful.
The binary result of encryption can e.g. be transported as an
attachment file in a normal email system (certainly also in an email
system with built-in "security features"). A good symmetric end-to-end
encryption of messages between two private persons can therewith be
very simply realized for the users.
(For an asymmetric encryption software, see
M. K. Shen
- » A Python implementation of AES with examples of counter mode operations,and encryption (wi...
- — Next thread in » General Computer Security
- » HOMOPHONE, a modern encryption scheme based on homophonic substitutions
- — Previous thread in » General Computer Security