Important alert: (current site time 7/16/2013 1:08:56 AM EDT)
 

winzip icon

[ SC2C Field Cipher ]

Email
Submitted on: 2/28/2005 2:40:29 PM
By: D. Rijmenants  
Level: Beginner
User Rating: By 1 Users
Compatibility: VB 5.0, VB 6.0
Views: 12459
author picture
(About the author)
 
     The SC2C Field Cipher combines fractionation and transposition to a very powerfull text encryption. It is a straightforward implementation of a straddling checkerboard, followed by a double columnar transposition, providing a very secure cipher. The advantage of this field cipher is that you can use both this program and the pencil-and-paper method to encrypt or decrypt your text messages. You can go for the comfort of this program, or use the cipher "in the field", without any technical means such as PC or Crypto Machine. Follow in the footsteps of many secret agents and Signal Corps operators. Just memorize 3 keywords to protect your secret text.

 
winzip iconDownload code

Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. Afterdownloading it, you will need a program like Winzip to decompress it.Virus note:All files are scanned once-a-day by Planet Source Code for viruses, but new viruses come out every day, so no prevention program can catch 100% of them. For your own safety, please:
  1. Re-scan downloaded files using your personal virus checker before using it.
  2. NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.
  3. Scan the source code with Minnow's Project Scanner

If you don't have a virus scanner, you can get one at many places on the net including:McAfee.com

 
Terms of Agreement:   
By using this code, you agree to the following terms...   
  1. You may use this code in your own programs (and may compile it into a program and distribute it in compiled format for languages that allow it) freely and with no charge.
  2. You MAY NOT redistribute this code (for example to a web site) without written permission from the original author. Failure to do so is a violation of copyright laws.   
  3. You may link to this code from another website, but ONLY if it is not wrapped in a frame. 
  4. You will abide by any additional copyright restrictions which the author may have placed in the code or code's description.


Other 28 submission(s) by this author

 


Report Bad Submission
Use this form to tell us if this entry should be deleted (i.e contains no code, is a virus, etc.).
This submission should be removed because:

Your Vote

What do you think of this code (in the Beginner category)?
(The code with your highest vote will win this month's coding contest!)
Excellent  Good  Average  Below Average  Poor (See voting log ...)
 

Other User Comments
2/28/2005 3:23:48 PMJames Miller

Thanks Dirk! For some reason I don't always understand the reading, but after viewing your code using it as an example and following it, it makes much more sense!
(If this comment was disrespectful, please report it.)

 
2/28/2005 6:50:39 PMRyan Cheeseman

pretty spiffay
(If this comment was disrespectful, please report it.)

 
3/1/2005 7:31:23 PMJames Miller

It just gets better everytime. Thanks for the update!
(If this comment was disrespectful, please report it.)

 
5/29/2006 1:13:11 AMManoj Kumar Chhimpa

I think it is very powerful encryption software and used by every one
(If this comment was disrespectful, please report it.)

 
9/11/2008 4:50:36 AMPiotr

I've made SC2C running in Windows CE enviroment on HPC (Jornada 680). It needed only a few minor changes (eg. function Mid on the left side of an assignment statement is not supported in eVB - I used "Left(..)&..&Left(..)" instead).
(If this comment was disrespectful, please report it.)

 

Add Your Feedback
Your feedback will be posted below and an email sent to the author. Please remember that the author was kind enough to share this with you, so any criticisms must be stated politely, or they will be deleted. (For feedback not related to this particular code, please click here instead.)
 

To post feedback, first please login.