Introduction - If you have any usage issues, please Google them yourself
Analysis of data encryption technology replacement algorithm and encryption and decryption of thought, given the encryption and decryption algorithms replacement program design and implementation steps, and provides a complete encryption and decryption algorithm source C