Introduction - If you have any usage issues, please Google them yourself
in the proceedings by PLAYFAIR (char* s, int length) the realization of encryption and decryption; encryption and decryption principle similar encryption process is the inverse process. It is based on the secret-using counterparts from the left, with the top candidate out from the rest of the cross from the opposite principle; the identification procedures used FLAG distinction, when its value to 1:00 for encryption process; the value of 0, for decryption.