Introduction - If you have any usage issues, please Google them yourself
a nonlinear flow encryption algorithms, symmetric encryption, the encryption and decryption are with the same key completion. Symmetric encryption faster than asymmetric encryption, but the drawback is that its security depends entirely on maintaining the confidentiality of passwords. Asymmetric encryption, it requires the use of two keys, one public (public key), and the other is owned by the (private key). Each key has requested the use of another key to a declassified information. Its complexity and therefore not universal.
Packet : 97288435sll.rar filelist
yuanyuan\encrypt_4.opt
yuanyuan\decrypt_3.cpp
yuanyuan\decrypt_4.opt
yuanyuan\decrypt_4.dsp
yuanyuan\decrypt_4.ncb
yuanyuan\decrypt_4.plg
yuanyuan\decrypt_4.dsw
yuanyuan\encrypt_4.cpp
yuanyuan\encrypt_3.opt
yuanyuan\decrypt_3.opt
yuanyuan\decrypt_4.cpp
yuanyuan\encrypt_4.dsp
yuanyuan\Debug
yuanyuan\encrypt_4.ncb
yuanyuan\encrypt_4.plg
yuanyuan\encrypt_4.dsw
yuanyuan\encrypt_3.dsp
yuanyuan\encrypt_3.ncb
yuanyuan\encrypt_3.plg
yuanyuan\encrypt_3.dsw
yuanyuan\decrypt_3.dsp
yuanyuan\decrypt_3.ncb
yuanyuan\decrypt_3.plg
yuanyuan\decrypt_3.dsw
yuanyuan\~$技术文档.doc
yuanyuan\encrypt_3.cpp
yuanyuan
yuanyuan\技术文档.doc