Source Code Online Home Categories Top Code New Code Submit Code
Code Directory
 Visual Basic & VB.NET
New Code
Job classified script 1.04
Esty clone - Esell 1.1
Joyfax Broadcast 7.85.0919
Free Yipit Clone Script - Grabber 1.1
Hotel Management - Full Board Version 5.29
PostgresDAC 2.12.2
VintaSoftBarcode.NET SDK 8.1
PHP B2B script 1.04
Fiverr clone script - Fixfive 1.1
Faxmind Server
Dynamic Web TWAIN 10.0
ProProfs Knowledge Base Software 6.3
Mergemill Pro 4.7.3
VISCOM Motion Detection SDK ActiveX 7.0
SourceAnywhere 6.1
Top Code
PAM HYIP script software 1.0
DTM Data Generator for JSON 1.00.01
OpenWire Studio Beta2
SignalLab VC++ 5.0.3
PlotLab VC++ 5.0.3
InstrumentLab VC++ 5.0.3
BasicVideo VC++ 5.0.3
Contest Software - Agriya v2.0b2
AudioLab VC++ 5.0.3
VideoLab .NET 6.0
SignalLab .NET 6.0
PlotLab .NET 6.0
IntelligenceLab .NET 6.0
InstrumentLab .NET 6.0
BasicVideo.NET 6.0
Top Search
Source Code Of Add Comment In Php
Photo Add Comment Php
Comments And Ratings
Free Html Projects
Add Comment Script
Final Year Computer Science Projects
Carpooling Website Php
Eroso Em Imagens B
English Movie Dubbed In Hindi Converter Software
Dirty Word
Php Guestbook Submit Picture
Dsp Mini Projects Using Matlab Simulation
Vb Mini Projects
Banned Dekaron
Freeware Call Logging System
Related Search
Beaufort Cipher
Source Code For Beaufort Cipher
Affine Cipher
Monoalphabetic Cipher
Monoalphabetic Substituation Cipher
Rsa Cipher
The Caesar Cipher
Caeser Cipher
Ceaser Cipher
Block Cipher
Multipicative Cipher Source Code
Affin Cipher
Cipher Code C
Cipher Algorithms
Java Code For Blowfish Cipher
 Beaufort Cipher 

Code 1-20 of 29   Pages: Go to  1  2  Next >>  page  

Some flexible substitution cryptogram encryption/decryption tools and a cipher generator.

File encryption/decryption using stream cipher.
It can encrypt/decrypt any type of file.

Given a message encoded with a shift/rotation cipher, such as rot13, this recipe recovers the most probable plain text for the message. It does this by using statistics of bigram (2-character sequence) counts from a sample of text.

The objective is to demonstrate character/ symbol frequency distribution analysis (reference to the English language) on 2 vintage ciphers, namely Caesar cipher (a mono-alphabetic substitution cipher) and the Vigenere cipher (a poly-alphabetic...

A 64-bit private-key block cipher, similar to DES.

A block cipher for the clipper chip program. 64bit blocksize, 80bit keysize. This implementation was developed totally outside of the USA and so it is free from export restrictions.

This program interactively lets you encrypt and decrypt text as well as text files using a key system as well as a cipher.

This function uses frequency analysis to attack and decode messages
encoded using a /substitution cipher/ which exchanges each letter of the
alphabet for another. Unlike the famous "Caesar Shift" cipher, which

The code generates binary sequence of a given length and then writes it to a .txt file. the sequence generated is random in nature and this cipher was used in GSM for 2 decades

The Rot13 Encoder/Decoder plugin allows bloggers and commenters to "encrypt" parts of their writing output with the ROT13 cipher in order to conceal media-related spoilers, punchlines, solutions, or sensitive topics from other readers...

JEnigma is a java API to implement the Enigma cipher, as used by the Enigma encryption machine.

TextConverter is a graphical text editor allowing the user to encrypt/decrypt the textual contents displayed on the screen using a 128-bit AES (Advanced Encryption Standard) cipher.

Generate a number output with leading zeros in a defined range and cipher count. Useful for shell developers for example to create directories or to mirror websites.

This component is based on the DEC component by Hagen Reddmann that is also freeware. aspEasyCrypt allows you to hash, cipher and make checksum on strings and files. With this component you can make strong security pages, sign page or messages,...

HsCipherSDK is an Encryption Library providing an API to a suite of symmetric key cryptographic algorithms and one way hash digital signature algorithms. The library includes the following block and stream cipher modules:

* AES...

It can be integrated into any Java program and provide a connection to a sshd server and use port forwarding, X11 forwarding, file transfer, etc.

It can automatically encrypt, authenticate, and compress transmitted data.


this software use for counting the alphabetic in text file(file.txt).
it can use for affine cipher attack cause this software can now the high distribution a alphabetic

In short, here's what this module does:

For site owners:
This module can provide you with readable passwords. Some users will be able to see other users passwords in plain text if they have a role with the permission to do so.

XTEA (eXtended Tiny Encryption Algorithm) support for db4o open source object database. XTEA is a block cipher that operates on a 64-bit block size with a 128-bit key. An extremely tiny but very fast encryption algorithm (with cycles less than 32...

SecExFile brings one-click file protection to the desktop. It integrates with Windows Explorer to make securing your personal or corporate data easy. SecEx File can be configured to email the armoured file once encryption is completed.+ Strong...