Description: There is an encryption method: its use a string of letters (which can contain repeated letters, the number of not more than 50 letters) as the key. Assume that the key word string as feather, first remove the key word is repeated in the letters to get the word string feathr, and then the other letters in the alphabet in reverse order appended to the back of feathr
To Search:
File list (Check if you may need any files):
8-5\5.c.txt
...\8.5.c
...\8.5.dsp
...\8.5.dsw
...\8.5.ncb
...\8.5.opt
...\8.5.plg
...\Debug\8.5.exe
...\.....\8.5.ilk
...\.....\8.5.obj
...\.....\8.5.pch
...\.....\8.5.pdb
...\.....\encrypt.exe
...\.....\encrypt.ilk
...\.....\encrypt.obj
...\.....\encrypt.pch
...\.....\encrypt.pdb
...\.....\vc60.idb
...\.....\vc60.pdb
...\encrypt.c
...\encrypt.dsp
...\encrypt.dsw
...\encrypt.ncb
...\encrypt.opt
...\encrypt.plg
...\encrypt.txt
...\output.txt
...\Debug
8-5