###############################SimpleEncryption################################
#Simple encryption implemented in python
#Author:pandeeswaran
###############################################################################
def Encrypt(input):
res=''
for i in input:
k = len(input) + 1
j=1
while j < k:
print("j is ",j)
val = ord(i) + j
res = res + ' ' + str(val)
j = j + 1
break
return res
input=str(input("Enter the input string:\n"))
result=Encrypt(input)
print("The encrypted value is\n",result)
While running:
Code:
Enter the input string:
well
j is 1
j is 1
j is 1
j is 1
The encrypted value is
120 102 109 109
But the output i expect is :
Code:
j is 1
j is 2
j is 3
j is 4
The encrypted value is
120 103 111 112
Building software in most languages is a pain. Remember ant build.xml, maven2 pom files, and multi-level makefiles?
Python has a simple solution for building modules, applications, and extensions called distutils. Disutils comes as part of the Python distribution so there are no other packages... (0 Replies)
I have the following problem, which I need done in Perl/ or Python using Unix/linux filters...
1. You have a very large file, named 'ColCheckMe', tab-delmited, that you are asked to process. You are told that each line in 'ColCheckMe' has 7 columns, and that the values in the... (1 Reply)
I have the following problem, which I need done in Perl/ or Python using Unix/linux filters...
1. You have a very large file, named 'ColCheckMe', tab-delmited, that you are asked to process. You are told that each line in 'ColCheckMe' has 7 columns, and that the values... (1 Reply)
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
This site is the first to get this snippet.
It will capture an audio recording of any time length within the limits of OSX's QuickTime Player's capablility...
A shell script derivative of this will be used as a further capture for CygWin's AudioScope.sh.
Thoroughly read ALL the comments in... (0 Replies)
I have the following code:
#!/usr/bin/env python
mylist =
def printWithoutNewlines():
for objects in mylist:
#print(objects)
objects = objects.replace('hello', "hi")
print objects
When executed, it gives the following output:
## ./loop.py
hi... (3 Replies)
Discussion started by: SkySmart
3 Replies
LEARN ABOUT PLAN9
encrypt
ENCRYPT(2) System Calls Manual ENCRYPT(2)NAME
encrypt, decrypt, netcrypt - DES encryption
SYNOPSIS
#include <u.h>
#include <libc.h>
int encrypt(void *key, void *data, int len)
int decrypt(void *key, void *data, int len)
int netcrypt(void *key, void *data)
DESCRIPTION
Encrypt and decrypt perform DES encryption and decryption. Key is an array of DESKEYLEN (defined as 7 in <auth.h>) bytes containing the
encryption key. Data is an array of len bytes; it must be at least 8 bytes long. The bytes are encrypted or decrypted in place.
The DES algorithm encrypts an individual 8 byte block of data. Encrypt uses the following method to encrypt data longer than 8 bytes. The
first 8 bytes are encrypted as usual. The last byte of the encrypted result is prefixed to the next 7 unencrypted bytes to make the next 8
bytes to encrypt. This is repeated until fewer than 7 bytes remain unencrypted. Any remaining unencrypted bytes are encrypted with enough
of the preceding encrypted bytes to make a full 8 byte block. Decrypt uses the inverse algorithm.
Netcrypt performs the same encryption as a SecureNet Key. Data points to an ASCII string of decimal digits with numeric value between 0
and 10000. These digits are copied into an 8 byte buffer with trailing binary zero fill and encrypted as one DES block. The first four
bytes are each formatted as two digit ASCII hexadecimal numbers, and the string is copied into data.
SOURCE
/sys/src/libc/port
DIAGNOSTICS
These routines return 1 if the data was encrypted, and 0 if the encryption fails. Encrypt and decrypt fail if the data passed is less than
8 bytes long. Netcrypt can fail if it is passed invalid data.
SEE ALSO securenet(8)BUGS
The source is not included in public distributions. The implementation is broken in a way that makes it unsuitable for anything but
authentication.
ENCRYPT(2)