answersLogoWhite

0


Best Answer

how to convert encryption to decryption using VB

User Avatar

Wiki User

16y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How do you convert Encryption to base64 decryption using asp?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering

Write a program to encrypt a string and decrypt it using your own method of encryption and decryption.?

We'll use a simple method of encryption: xor encryption // same function used to both encrypt and decrypt void crypt(char *str) { const int key = 0x86; // crypt each individual character of str int i; const int length = strlen(str); for(i = 0; i < strlen(str); ++i) { str[i] = str[i] ^ key; } }


What are2 examples of data encryption methods?

cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is information (in cryptography, referred to as ciphertext). The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e., to make it unencrypted).


Advantages of RSA algorithm in encryption and decryption of a plain text?

RSA's biggest advantage is that it uses Public Key encryption. This means that your text will be encrypted with someone's Public Key (which everyone knows about). However, only the person it is intended for can read it, by using their private key (which only they know about). Attempting to use the Public Key to decrypt the message would not work. RSA can also be used to "sign" a message, meaning that the recipient can verify that it was sent by the person they think it was sent by.


What is a sentence using the word convert as a verb?

Heat is used to convert water to vapor.


How do you write a c program to convert binary to decimal by using while statement?

write a c++ program to convert binary number to decimal number by using while statement

Related questions

Can you use AES for encryption and decryption at same hardware?

Using the same (or different) hardware will work with AES as long as the encryption and decryption use the same key. AES relies on the symmetric encryption key which means the same key is used to lock and unlock the data. The hardware that uses it does not matter.


How does SSL work?

SSL works by making sure processing transactions on line are secure by using different encryption/decryption programs.


What is the difference between decryption and encryption?

encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext).In many contexts, the word encryption also implicit encryption is the process of transforming informationWhereas decryption is the process of changing the encrypted text back into plaintext


What do encryption and decryption describe?

Encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge.Decryption is to make the encrypted information readable again, to make unencrypted.


How do you use file and folder encryption with a volume using the fat file system and windows?

Convert the volume to NTFS


Where is Base64 commonly used?

Base64 is commonly used in XML files, HTML files, and can also even be used to help an advertiser spam one's email using a specially designed binary code.


What can you do so that you can use file and folder encryption with a volume using the FAT file system and Windows Vista Business edition?

Convert a FAT volume to NTFS so that you can use encryption.


How does laptop encryption work?

A laptop works almost exactly like a bike lock. You have to wrap the laptop lock wire around a heavy object and then you insert a metal piece into the actual laptop. It's not destructible and can be broken off, since the laptop is still plastic, but in reality it does stop many from actually committing the crime of taking your laptop. http://laptopfanz.com


What are the advantage and disadvantage of encryption?

The single most important reason for using encryption is to preserve confidentiality. This means that only an authorized receiver can read the message (the receiver must have the appropriate decryption key).The disadvantage is the overhead it takes to encrypt and decrypt the messages, especially if a digital certificate is involved, because it may have to be authenticated as well, and that takes time.


A mathematical process of coding information so that only the intended user can read it?

It's called encryption. The reverse process is called decryption, and the whole process works because only the intended user has the information (called a "key") or the device that is needed to perform the decryption. The key must be something that can't be guessed or "cracked" using "brute force" (trying lots of keys). so it's usually a long random-looking string of characters an/or digits. If decryption is done using a device, the device must not be easily duplicated, and will probably have to be closely guarded by its owner.


What can you do so that you can use file and folder encryption with a volume using the FAT file system?

Nothing. The FAT file system simply does not support the features needed for file/folder encryption. You'll have to convert the volume to NTFS.


Write a program to encrypt a string and decrypt it using your own method of encryption and decryption.?

We'll use a simple method of encryption: xor encryption // same function used to both encrypt and decrypt void crypt(char *str) { const int key = 0x86; // crypt each individual character of str int i; const int length = strlen(str); for(i = 0; i < strlen(str); ++i) { str[i] = str[i] ^ key; } }