01-10-2006, 06:25 AM
Quote:Well, I don't know how it works but it does seem solid. Neat.Simply, it overlays Password$ end-to-end over X$, then XORs X$ based on the value of Password$ at that character:
Code:
This is the line to be encrypted.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
passwordpasswordpasswordpasswordp
Code:
This is the line to be encrypted.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
ppppppppppppppppppppppppppppppppp
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
sssssssssssssssssssssssssssssssss
sssssssssssssssssssssssssssssssss
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
ooooooooooooooooooooooooooooooooo
rrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
ddddddddddddddddddddddddddddddddd
stylin: