>>1
That kind of encryption is dead. The problem is, with that, you have the method of encryption on a computer, and the method of decrypting on your recipient's computer. They can be hacked. The programs can be reverse-engineered to get the method. Then your encryption is about as good as ROT-26.
Name:
Anonymous2007-02-06 0:47
Don't roll your own. Use AES, Twofish or some such algorithm that's had some actual research and is a proper standard. If you're really paranoid, use separate key material for both and encrypt twice.
Name:
Anonymous2007-02-06 6:58
AES is developed by people who are smarter than you and me, tested for more hours than you and I have in our lives, and used by people that sum more money than we can even imagine. If it's secure for them, it's secure for us. For massive damage, do what >>10 said; that way you could afford to have one of the two "broken" (more like weakened by mathematical analysis to find a quicker way to find your key or an equivalent key).
Name:
Anonymous2007-02-06 11:50
temp = str[i];
str[i] = str[o];
str[o] = temp;
lol, only fags use temp variables when swapping data
VROMM VROOM FAST AND LESS MEMORY BEXCAUSE IT DOEST USE VARIABLES OOPS CFLAGS JUIST KICKED IN IM OFF BYEEEEEEEEEEEEEE~~~~~~
Name:
Anonymous2007-02-06 12:45
All of you suck. If he wants to write his own encryption lib, fine, it'll help him get forward. Just using software without trying to write your own is what Myspace users do.
Bringing /prog/ back to its people
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy