10-15-2019 12:03 PM
@Binnu wrote:
Please provide me the algorithm.
There are many known encryption algorithms, just do a web search. An algorithm is independent of any programming language, so why are you posting in the LabVIEW forum?
Once you decide on an algorithm, you can try to implement it in a programming language of your choice as a good exercise. Is that what you are trying to do?
10-15-2019 12:26 PM
I want to know the algorithm used in this code.Tell the name of the algorithm and I will read about it in wikipedia.I
Thank you.
10-15-2019 12:27 PM
I want to know the algorithm used in this code.Tell the name of the algorithm and I will read about it in wikipedia.
Thank you.
10-15-2019 12:45 PM
Simple Encryption Using XOR://lmgtfy.com/?q=simple+encryption+using+xor
https://lmgtfy.com/?q=simple+encryption+using+xorhttps://lmgtfy.com/?q=simple+encryption+using+xor
10-15-2019 12:48 PM
That looks like "security through obscurity" to me.
Have you looked my my example? I know it's not perfect but at least you can understand how it works just by looking at it.
10-15-2019 01:21 PM
I'm happy you clarified that this "encryption" algorithm is meant as a learning experience for you. As an algorithm for encryption, it is relatively poor -- please do not use it yourself for anything you really need to keep secure. There are much better (and mostly free, and mostly convenient) algorithms out there.
But you want to know about your LabVIEW Style. Here are some suggestions:
Bob Schor
10-17-2019 06:30 AM
Hi dude
Let me be honest,I do not know anything about labview.My faculty insisted me to do encryption and decryption project in labview. I know its weird.But there is nothing much I can do in this short span of time please try to explain me what is going inside your block diagram so that I can explain to my mam and will not get fail in project review,atleast a rough idea of how the file is encrypted and how it is decrypted. So that I will be able to understand it clearly when I see code.
Waiting for your reply.
Thanks in advance!
10-17-2019 06:36 AM
I'm no dude and I do not do homework for people who should have done that for their own grades.
10-17-2019 09:22 AM
Well I am feeling generous this morning so I will give you a few hints on what to do...
Encryption is done by XOR a repeating "key" and your data byte by byte.
Convert your key to a U8 byte array
Convert your data to a U8 byte array
XOR these two byte arrays an element (byte) at a time repeating the "key byte array" as many times as it takes.
Save the encrypted output to a file
Decryption is the reverse XOR the same repeating key with the encrypted data byte by byte.
10-17-2019 12:11 PM
Thanks for your concern 🙂 .It helped me!! Thank you so much.