A TXT text encryption/dl is beginning, what is this encryption method?
CodePudding user response:
God knows, normal encryption is not want to make you a bad solution, I will not give do special data head ciphertext, carrying a ciphertext is not don't know the encryption algorithm to further improve the decoded difficulty
CodePudding user response:
reference 1/f, crispy big ice cream reply: who knows, normal aren't encrypted is to make you bad, I wouldn't have to do special data head ciphertext, carrying a ciphertext is not don't know the encryption algorithm to further improve the operational peed I think it might also be a "software" for his "encrypted file" do a tag, But the concrete encryption "others" don't know, it is difficult to break, It had the mark, in "your" to read a file, find specific markers in the beginning, then after reading the decryption process; Otherwise, you see the file as "unsecured" plain text file processing, CodePudding user response:
Want me to do is clear there is a fixed file header, then encrypt and decrypt the front a little processing, and see if it is my own data format, if it is to continue, if not an error or what, anyway, will not live on the ciphertext what a flower CodePudding user response:
Well, you this is a valuable way, CodePudding user response:
However, as these should not belong to "high" security classification, in the encrypted file, there is no problem head marking, The key, don't know the encryption/decryption algorithm, to decrypt the is very troublesome, CodePudding user response:
This is completely no clue CodePudding user response:
Encrypted thing let you so easy to have idea, encrypted people wouldn't it be fail? CodePudding user response:
DL is what I don't know, but I know what meaning is MZHBJZH, Legend each to obtain a marriage certificate of the people will find the little red book with a line of English, MZHBJZH What do you mean, each netizen speculation, "sister why marry this goods" "sister why rush to change", "sister why this marriage"... Finally, write the word to explain, you know what is mean, So, back to your question, who define who asked you to, CodePudding user response:
refer to 7th floor crispy big ice cream reply: encrypted thing let you so easy to have idea, encrypted people wouldn't it be fail? Don't think, a good encryption algorithm is not the encryption algorithm and cipher code format hidden deep, but depend on the key itself, and the encryption algorithm is public, Is like a security guard against theft should be have a safety lock and key, rather than the open authority set is hidden, open the door step design is very complicated, CodePudding user response:
references 9 f caozhy response: Quote: refer to 7th floor crispy big ice cream reply: Encrypted thing let you so easy to have idea, encrypted people wouldn't it be fail? Don't think, a good encryption algorithm is not the encryption algorithm and cipher code format hidden deep, but depend on the key itself, and the encryption algorithm is public, Is like a security guard against theft should be have a safety lock and key, rather than the open authority set is hidden, the door step design is very complicated, Standard public encryption algorithm a handful of symmetric asymmetric hash, but is there which algorithm in front of the ciphertext plus special logo? Only according to the length and the ciphertext speculation is a hash algorithm, or according to the ass==guess whether such as base64, give you a length of 1 k of data flow, you can know which algorithm is? The outside of the security guard against theft on the note told you lock is what type? Do not the security encryption algorithm is to use a few mathematical principles, then use iteration to lock the door and the door steps to make it as complicated? Several strength of the encryption algorithm is based on the number of iterations, and the number of iterations is adjustable, Security door security based on the internal mechanical structure is exquisite, the lock steps can't be too complicated, computer encryption, again how complex, is tired of the CPU, make a good man "slightly", etc., let the bad guys wait for death, a thief is unable to take security doors move back home slowly study, take the axe smashed the door should also be mindful of the people around, ciphertext is likely to be a thief at home break, even know it with hammers, also can't let a thief easily know which easy to open,