Introduction - If you have any usage issues, please Google them yourself
Can be realized based on the basic DES encryption and decryption as well as the short-block, the weak-key analysis realize.
Packet : 63535323des.rar filelist
DESLANCE\Debug
DESLANCE\DESLANCE.APS
DESLANCE\DESLANCE.clw
DESLANCE\DESLANCE.cpp
DESLANCE\DESLANCE.dsp
DESLANCE\DESLANCE.dsw
DESLANCE\DESLANCE.h
DESLANCE\DESLANCE.ncb
DESLANCE\DESLANCE.opt
DESLANCE\DESLANCE.plg
DESLANCE\DESLANCE.rc
DESLANCE\DESLANCEDlg.cpp
DESLANCE\DESLANCEDlg.h
DESLANCE\function.h
DESLANCE\lance.tpp
DESLANCE\ReadMe.txt
DESLANCE\res\DESLANCE.ico
DESLANCE\res\DESLANCE.rc2
DESLANCE\res\Thumbs.db
DESLANCE\res
DESLANCE\Resource.h
DESLANCE\StdAfx.cpp
DESLANCE\StdAfx.h
DESLANCE