The Random Keys Distribution Encryption RoutineEncryption Routine is a strong encryption/decryption routine based on a 4 number keyes random seed distribution hash. | |
Download |
The Random Keys Distribution Encryption Routine Ranking & Summary
Advertisement
- License:
- Freeware
- Publisher Name:
- Jasenko Dzinleski
- Operating Systems:
- Windows 2K / XP / Vista
- File Size:
- 36 KB
The Random Keys Distribution Encryption Routine Tags
- encrypt key Encryption file encryption Installation routine parsing routine LCD routine workout routine routine generator routine save routine automating routine tasks statistical routine provide stretch routine provide blit routine routine simplifier bitmap transformation routine encoding routine encryption routine random key distribution strong encryption routine automation card game routine random encryption random encryption technique ACT Routine DES encryption decryption set routine task AutoCAD Routine common used routine routine library Compression Routine application routine Monte Carlo routine file fingerprint routine Compare Routine String Routine Library Routine YaBasic routine C++ routine encryption decryption encryption and decryption decryption and hash ActiveX com stored routine debugger routine debugger fast encryption/decryption portable encryption/decryption strong disk encryption server based encryption AES encryption decryption
The Random Keys Distribution Encryption Routine Description
This routine was written by the authors wish to try to improve message privacy while sent across the networks. The Random Keys Distribution Encryption Routine is a strong encryption/decryption routinethat is based on a 4 number keys random seed distribution hash. The command line switches to encrypt are E.g.: C:r7 -a 11111 -b 22222 -c 33333 -d 44444 -e "filename.txt" The command line switches to decrypt are E.g.: C:r7 -a 11111 -b 22222 -c 33333 -d 44444 -f "filename.txt" The 4 numbers following the -a -b -c -d switches should have the values between 10000 and 99999. They are the entry seed values and are used instead of the common password protection method. Cyphering strength is high due to use of hashed number table based on 4 function rundom number distribution. One out of the 4 functions running inside this encryption is used in the Game of life which is listed for download, and it states the diversity of random number distributions produced.
The Random Keys Distribution Encryption Routine Related Software