Skip to main content

All Questions

1vote
0answers
129views

Shuffle Tool / Software [closed]

I use GPG symmetric, to encrypt text file. Is it possible to use GPG symmetric, to encrypt a text file, and at the same time, add additional setting to the encrypted file, to give us 2 conditions: ...
leon's user avatar
2votes
2answers
448views

Is there such a cryptographic algorithm?

Is there such a cryptographic algorithm that will encrypt any file with a password. But when decrypting, if the password is incorrect, the file will be decrypted, but instead of relevant data there ...
optic1's user avatar
2votes
4answers
10kviews

If I have the input and output, can I know the encryption technique?

I have a program that can encrypt text, I tried to discover the encryption that is used in this program and could not figure it out, knowing that if the plaintext is P and the encrypted text is C, if ...
Null's user avatar
1vote
1answer
1kviews

How to decrypt a text with substitution cipher? [closed]

I recently got a file which I had encrypted with substitution cipher a long time ago. I went to crack down the key and almost got it. But I encrypted it not just with alphabets but also with numbers ...
remedcu's user avatar
2votes
1answer
747views

What is Megan-35 encryption?

There are a lot of websites offering online Megan-35 encryption/decryption. Surprisingly, I haven't been able to spot out any resources detailing the underlying algorithm. Can anyone provide any link ...
sherlock's user avatar
-1votes
1answer
321views

Is this algorithm safe for encryption? (Cryptography Algorithm is provided)

Jasoos (Cryptography Algorithm) I am working on encrypting and decrypt web application. I have built an algorithm that uses 24 bits long key to encrypt/decrypt the message. Review this algorithm and ...
gauravd2196's user avatar

close