How It Works:
First, the program identifies if a password is present,
if no password is present then the process will encode ASCII only!
Next, if type I encryption is to be used and a password is present, a number is calculated based on the length and value of each character within the password.
the source is then one character at a time, resulting in the encrypted output.
If type II encryption is to be used and a password is present, then the process is the same with the following difference...
The source characters that are altered are done with a dynamic progression,
so that each character is mathematically dependant on the last,
and words cannot be guessed by any decryption program searching
for common words.
This process of interdependance is calculated based on the password length.
The password and password length is not stored in either type I or type II
encryption processes!
|