Aseem Nasnodkar
In the zone
Can neone tel me how encryption algorithms are blown off.
I know C. So I keep making small encryption programs. Well professionals will get through those. But how does one come to know the acyual process carried out in encryption and accord. decrypt the textual msg???
Well encrypting A to ), B to * n stuff like dat is fine. But if one makes a program say:
Let us consider 8 char in d file at a time. Change every charac to smthin else in the 8 chars and then interchange their places. That shud b full proof??? But then how does one get through???
And again if more mathematical functions are involved in considering the offset of the charac in the file to convert it and the totla size of file, etc, etc???
Is it dat only by trial and error methods this can b done??? Or ne special softs. Pls if nebody knows such softs that check the integrity of the encrypted msg.
I know C. So I keep making small encryption programs. Well professionals will get through those. But how does one come to know the acyual process carried out in encryption and accord. decrypt the textual msg???
Well encrypting A to ), B to * n stuff like dat is fine. But if one makes a program say:
Let us consider 8 char in d file at a time. Change every charac to smthin else in the 8 chars and then interchange their places. That shud b full proof??? But then how does one get through???
And again if more mathematical functions are involved in considering the offset of the charac in the file to convert it and the totla size of file, etc, etc???
Is it dat only by trial and error methods this can b done??? Or ne special softs. Pls if nebody knows such softs that check the integrity of the encrypted msg.