Languages Java Security  

Transposition Cipher Full

download download home home  
important code information
author:
FAzle AreFin
minimum requirements:
Transposition Cipher Full description

This program let you use Transposition Cipher Encrypt and Transposition Cipher Decrypt from this same program. <<<Transposition Cipher Encrypter>>> This program encrypts a message using TRANSPOSITION CIPHER. The program uses a key, provided by the user to encrypt the message. Encrypted message can be decrypted using Transposition Cipher Decryption program, also submitted by me. <<<Transposition Cipher Decrypter>>> This program decrypts a message using TRANSPOSITION CIPHER. The program uses a key, provided by the user to decrypt the cyphertext.


File List:
TranspositionCipher/0b
TranspositionCipher/TranspoCipherDe.java8Kb
TranspositionCipher/TranspoCipherEn.java8Kb
TranspositionCipher/TranspositionCipher.jar8Kb
TranspositionCipher/TranspositionCipher.java2Kb
TranspositionCipher/readme.txt40b
TranspositionCipher/run_unix.sh35b
TranspositionCipher/run_win.bat35b

Similar code
Simplified DES (Popularity: ) : This application is used to encrypt/decrypt text based on a given password, using the Simplified DES algorithm. It produces a different encryption for different passwords, it successfully decrypts text only when the correct password is given.
Matthew Sparrows Javascript Password Protection (Popularity: ) : msjsPP is a code snippet that is used to password protect a single html document or a complete section of software. It will limit the amount of invalid guesses allowed, and after X attempts, automatically redirect them elsewhere.
A Port Scanner (Popularity: ) : Keep an eye on the open ports in your local pc. A java written port scanner which looks for the open ports in the given server and logs a report of them.
Transposition Cipher Decrypter (Popularity: ) : This program decrypts a message using TRANSPOSITION CIPHER. The program uses a key, provided by the user to decrypt the cyphertext. Message can be encrypted using Transposition Cipher Encryption program, also submitted by me.
Transposition Cipher Encrypter (Popularity: ) : This program encrypts a message using TRANSPOSITION CIPHER. The program uses a key, provided by the user to encrypt the message. Encrypted message can be decrypted using Transposition Cipher Decryption program, also submitted by me.
Umanga (Popularity: ) : Sample chat server and client.Server can accept multiple clients.ServerSocket accept and make individual Socket(runs in a Thread) for each client.
Access v4.0 (Popularity: ) : This script has only a password box. You can have multiple users and have them redirected to a specific page. This script has been made so that no one can view the source code. try to see if you can ...
Hide Basic Authentication with HMTL Forms (Popularity: ) : I figured out how to let my users login with a form rather then using the built in dialog for basic authentication. Only problem is, if they get the username/password wrong, then they will still get that built in dialog. ...
Web Protections - IE4+ & NS4+ (Popularity: ) : Your search for protecting your web content ends here. All in one scripts for (With Examples) protecting your web content. Simply download the file & try it yourself.
No Source, No Right Click, No Key Press (Popularity: ) : Hides menu bar and tool bar from the browser to Protect your code and images on web pages, plus it prevents right clicking. You need 3 pages 2 of mine and one of yours I included all three in the ...
User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
Email*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
 
Rate me
supported os
stats
downloads 544
version
size in Kb 13
popularity   12335/7914269
user rating 6/10
ad


New Code
Popular Code