Click here to Skip to main content
15,886,362 members
Articles / Security / Cryptography

Self Driven Cryptographic Operations

Rate me:
Please Sign up or sign in to vote.
4.00/5 (3 votes)
22 Apr 2012CPOL3 min read 13.2K   5  
Input drives action to perform : Encryption or Decryption - Implementation of user defined encryption signature with standard cryptographic algorithms

Views

Daily Counts

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


Written By
Business Analyst
United States United States
This member has not yet provided a Biography. Assume it's interesting and varied, and probably something to do with programming.

Comments and Discussions