-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathAlgorithm_list.txt
17 lines (16 loc) · 966 Bytes
/
Algorithm_list.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
In this file are listed all the available characters that can be used when
building a password for encoding/decoding. Any characters not presented in
this file will be ignored and treated as the 'a' character. The characters
that are followed by an asterisk (*) also accept a digit (0-9) right after
the character.
a -> Character gets ignored
b* -> Cycles the bits of the text (*) positions towards the left. If
the digit is not present, defaults to 4.
c -> Performs a NOT operation on the bits of the input.
d -> Reverses the bits of the input.
e -> Reverses the characters of the input.
f -> Performs an exclusive OR (XOR) operation with the input and the
password. If the password is shorter than the text, it repeats.
g -> Performs an exclusive OR (XOR) operation with the input and the
randomly generated values seeded with the password.
h -> Rivest Cipher 4 algorithm.