Important alert: (current site time 7/16/2013 4:45:17 AM EDT)
 

winzip icon

Data-Lock 2.0 - Fully Documented - Crypto Algorithm

Email
Submitted on: 12/22/2001 11:01:23 PM
By: kirse  
Level: Intermediate
User Rating: By 29 Users
Compatibility: Delphi 5, Delphi 4, Pre Delphi 4
Views: 20845
 
     Fully documented!!! I have written the entire algorithm - probably unbreakable by 90% of general computer users - but, it still can be cracked... There are about 700 lines of code to show you many different aspects of Delphi programming.. check it out!! If you like it, please VOTE.

 
winzip iconDownload code

Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. Afterdownloading it, you will need a program like Winzip to decompress it.Virus note:All files are scanned once-a-day by Planet Source Code for viruses, but new viruses come out every day, so no prevention program can catch 100% of them. For your own safety, please:
  1. Re-scan downloaded files using your personal virus checker before using it.
  2. NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.

If you don't have a virus scanner, you can get one at many places on the net including:McAfee.com

 
Terms of Agreement:   
By using this code, you agree to the following terms...   
  1. You may use this code in your own programs (and may compile it into a program and distribute it in compiled format for languages that allow it) freely and with no charge.
  2. You MAY NOT redistribute this code (for example to a web site) without written permission from the original author. Failure to do so is a violation of copyright laws.   
  3. You may link to this code from another website, but ONLY if it is not wrapped in a frame. 
  4. You will abide by any additional copyright restrictions which the author may have placed in the code or code's description.


Other 1 submission(s) by this author

 


Report Bad Submission
Use this form to tell us if this entry should be deleted (i.e contains no code, is a virus, etc.).
This submission should be removed because:

Your Vote

What do you think of this code (in the Intermediate category)?
(The code with your highest vote will win this month's coding contest!)
Excellent  Good  Average  Below Average  Poor (See voting log ...)
 

Other User Comments
12/22/2001 11:13:08 PMkirse

Before you speak David, please take to heart that I already know this encryption cannot match Rijndael or RC6.
(If this comment was disrespectful, please report it.)

 
12/31/2001 1:42:08 PMkipx

Hey kirse. I have't talked to you in awhile. Glad to see you've moved up into Delphi! Anyhow - excellent code!One thing though, like you said, you should code it to pull the key from the text instead of placing it at the front; as that kinda ruins the entire algorithm...
Anyhow, I'm gonna check out some of the other projects here. If you're on, IM me at Eugene770.
(If this comment was disrespectful, please report it.)

 
1/21/2002 5:19:50 AMsyd

not bad...but 90% of computer users...LMAO...work on your theory better. :P
(If this comment was disrespectful, please report it.)

 
3/9/2003 5:34:18 AM

haven't tested it yet, but i like the idea :). I think i'll use it for saving files ;]. Unless i find better :). Anyway... i vote for u :)
(If this comment was disrespectful, please report it.)

 

Add Your Feedback
Your feedback will be posted below and an email sent to the author. Please remember that the author was kind enough to share this with you, so any criticisms must be stated politely, or they will be deleted. (For feedback not related to this particular code, please click here instead.)
 

To post feedback, first please login.