My GitHub code : https://github.com/devmecha/Example_Ionic3_-Angular-5
PYTHON : HACKING THE SUBSTITUTION CIPHER
You may want to see :
PYTHON : THE SUBSTITUTION CIPHER - ENCRYPTING & DECRYPTING
PYTHON : THE AFFINE CIPHER - ENCRYPTING & DECRYPTING
PYTHON : TRANSPOSITION CIPHER - DECRYPTING
PYTHON : ENCRYPTING & DECRYPTING FILES WITH TRANSPOSITION CIPHER
References :
In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.
.
PYTHON : THE SUBSTITUTION CIPHER - ENCRYPTING & DECRYPTING
You may want to see :
PYTHON : THE AFFINE CIPHER - ENCRYPTING & DECRYPTING
PYTHON : TRANSPOSITION CIPHER - DECRYPTING
PYTHON : ENCRYPTING & DECRYPTING FILES WITH TRANSPOSITION CIPHER
References :
In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.
.
PYTHON : KEYLOGGER 1.0
You may want to see :
PYTHON : THE AFFINE CIPHER - ENCRYPTING & DECRYPTING
PYTHON : TRANSPOSITION CIPHER - DECRYPTING
PYTHON : ENCRYPTING & DECRYPTING FILES WITH TRANSPOSITION CIPHER
References :
Using a KeyLogger is an act of tracking and recording every keystroke entry made on a computer, often without the permission or knowledge of the user.
PYTHON : HACKING THE AFFINE CIPHER
You may want to see :
PYTHON : THE AFFINE CIPHER - ENCRYPTING & DECRYPTING
PYTHON : TRANSPOSITION CIPHER - DECRYPTING
PYTHON : ENCRYPTING & DECRYPTING FILES WITH TRANSPOSITION CIPHER
References :
The affine cipher is a type of monoalphabetic substitution cipher, wherein each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted back to a letter. The formula used means that each letter encrypts to one other letter, and back again, meaning the cipher is essentially a standard substitution cipher with a rule governing which letter goes to which. As such, it has the weaknesses of all substitution ciphers. Each letter is enciphered with the function F(x) = (ax + b) mod m,
where modulus m is the size of the alphabet and a and b are the key of the cipher.
THE AFFINE CIPHER - ENCRYPTING & DECRYPTING
You may want to see :
PYTHON : TRANSPOSITION CIPHER - ENCRYPTING
PYTHON : TRANSPOSITION CIPHER - DECRYPTING
PYTHON : ENCRYPTING & DECRYPTING FILES WITH TRANSPOSITION CIPHER
References :
The affine cipher is a type of monoalphabetic substitution cipher, wherein each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted back to a letter. The formula used means that each letter encrypts to one other letter, and back again, meaning the cipher is essentially a standard substitution cipher with a rule governing which letter goes to which. As such, it has the weaknesses of all substitution ciphers. Each letter is enciphered with the function F(x) = (ax + b) mod m,
where modulus m is the size of the alphabet and a and b are the key of the cipher.
PYTHON : HACKING THE TRANSPOSITION CIPHER
You may want to see :
PYTHON : TRANSPOSITION CIPHER - ENCRYPTING
PYTHON : TRANSPOSITION CIPHER - DECRYPTING
PYTHON : ENCRYPTING & DECRYPTING FILES WITH TRANSPOSITION CIPHER
References :
In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext.