Introduction - If you have any usage issues, please Google them yourself
1. Analysis of ECB mode and CBC mode of encryption process. 2. Used programming language programming to realize the algorithm process. 3. Enter explicitly: I do like this book encryption algorithm E: XOR ⊕, key for cryption shift, key for 5 filled two modes: (1) 0 (2) misappropriated Ciphertext initialization vector IV : goodluck with two modes for encryption, the output corresponding ciphertext.
Packet : 97288423modes.rar filelist
modes.c