Description: This procedure is based on the transposition and substitution algorithm implementation of information encryption and decryption, safe to information industry and in the code area of study is a good example of.
To Search:
File list (Check if you may need any files):
Lab4.cpp
lab1.cpp
Lab2.cpp
Lab3.cpp