Introduction - If you have any usage issues, please Google them yourself
Such a train of thought: First of all, through the extraction time and run-time system encryption algorithm as the dynamic parameters for file encryption, and then these parameters, as well as whether the encrypted password and encryption load signs to a file (or can not decrypt the files on), and finally in If decryption is extracted through a certain method of these parameters may be declassified.
    As a result of these parameters are dynamic, so every time a file is encrypted with the results are different, so for those who break the law to follow the no.
    This is a symmetric encryption password, it is difficult to break with exhaustive method (although I have not tried), but with the gold class teacher who said symmetric cipher like DES, the ratio is not that those things can be disclosed algorithm, The biggest flaw of this algorithm is as long as the parameters of the other party know that I am way encryption, the password can easily be cracked, that