My GitHub code : https://github.com/devmecha/Example_Ionic3_-Angular-5
You may want to see :
PYTHON : THE SUBSTITUTION CIPHER - ENCRYPTING & DECRYPTING
PYTHON : THE AFFINE CIPHER - ENCRYPTING & DECRYPTING
PYTHON : TRANSPOSITION CIPHER - DECRYPTING
PYTHON : ENCRYPTING & DECRYPTING FILES WITH TRANSPOSITION CIPHER
References :
In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.
.
You may want to see :
PYTHON : THE AFFINE CIPHER - ENCRYPTING & DECRYPTING
PYTHON : TRANSPOSITION CIPHER - DECRYPTING
PYTHON : ENCRYPTING & DECRYPTING FILES WITH TRANSPOSITION CIPHER
References :
In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.
.
You may want to see :
PYTHON : THE AFFINE CIPHER - ENCRYPTING & DECRYPTING
PYTHON : TRANSPOSITION CIPHER - DECRYPTING
PYTHON : ENCRYPTING & DECRYPTING FILES WITH TRANSPOSITION CIPHER
References :
Using a KeyLogger is an act of tracking and recording every keystroke entry made on a computer, often without the permission or knowledge of the user.
You may want to see :
PYTHON : THE AFFINE CIPHER - ENCRYPTING & DECRYPTING
PYTHON : TRANSPOSITION CIPHER - DECRYPTING
PYTHON : ENCRYPTING & DECRYPTING FILES WITH TRANSPOSITION CIPHER
References :
The affine cipher is a type of monoalphabetic substitution cipher, wherein each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted back to a letter. The formula used means that each letter encrypts to one other letter, and back again, meaning the cipher is essentially a standard substitution cipher with a rule governing which letter goes to which. As such, it has the weaknesses of all substitution ciphers. Each letter is enciphered with the function F(x) = (ax + b) mod m,
where modulus m is the size of the alphabet and a and b are the key of the cipher.