Introduction - If you have any usage issues, please Google them yourself
Jane said, slightly under the encrypted decryption key is obtained through the first 8 bytes+ the key to computing
The first 8 bytes is based on random number+ start-up time from operation
For more ideas take a look at the code should be able to see to understand
Key set to support any Chinese, letters, numbers, symbols (repeatable)
In fact, the process is not complex and can read people should feel very simple
Operation mainly use bit different or (xor) bit to take anti-(not)
The same content each time the encrypted content is not dynamically generate the same random
Required to decrypt the encrypted contents of the byte when the need to preserve integrity
Bytes will result in a lack of anywhere to decrypt error (unless the end of it the most)
Key (key) must remain consistent with the encryption
Encryption and decryption test results CPU: (R) D 2.8
30,000 bytes (easy language upgrade process. Txt)
Only encrypted or decrypted in a time-consumin