1 Substitution Algo 1 Transposition Algo
Combine for CRWA
C = Cyphertext M = Plaintext message K = Key E = Encrypt Function D = Decrypt Function
C^1 = E^1(K^1, M) M = D^1(K^1, C^1)
Look at hacking with PYthon book files
!! USE CAESAR CYPHER 2 from HWP book coding examples !!
Integrate enc dec code from HWP book directory, directly.
Convert and simplify cypher code samples from HWP, into importable py files using def
where variables (key message mode) can be passed through and cyphertext is returned.
Do enc decrypt at bit level convert to binary from decimal = baseconvert(letter, BASE10, BASE2);
Generate Random keys for each algo on program execution (then on CMDCRL connection). Put this key into formated string BASE64ENC(K^1+"::"+K^2+"::"+K^3) then send formated string to CMDCRL server and destroy any local copy of keys. When Payment made, send formated string back to client machine for deformating into keys for decryption.
3 q do we have a implement algos at all? how to send key back to client? HTTPS WS does credit comment make the algos used identifiable?