Home
Search results “Cryptographie fonction affine definition”
chiffrement affine • cas général pour décoder un message • arithmétique - spé maths Terminale S
 
30:34
Objectifs: - savoir si une clé (a;b) est satisfaisante - savoir décoder un message - savoir résoudre des équations avec des conguences - savoir utiliser l'algorithme d'Euclide pour trouver les coefficients de Bézout - savoir utiliser le théorème de Bézout http://jaicompris.com/lycee/math/arithmetique/theoreme-gauss.php arithmétique - mathématiques - spé maths terminale S
Views: 4254 jaicompris Maths
chiffrement affine • Savoir démontrer qu'un codage fonctionne correctement • Très important
 
13:53
Objectifs: - comprendre le chiffrement affine - savoir coder un message - savoir montrer qu'une clé de chiffrement est satisfaisante http://www.jaicompris.com/lycee/math/arithmetique/congruence-Z.php arithmétique - congruence - spécialité mathématique
Views: 3093 jaicompris Maths
Cryptographie - partie 1 : chiffrement de César
 
17:39
Chapitre "Cryptographie" - Partie 1 : Le chiffrement de César Plan : César a dit... ; Des chiffres et des lettres ; Modulo ; Chiffrer et déchiffrer ; Espace des clés et attaque ; Algorithmes Exo7. Cours et exercices de mathématiques pour les étudiants. Retrouvez le polycopié sur http://exo7.emath.fr
Views: 133282 Exo7Math
Chiffrement de Hill - coder et décoder un message - matrices et congruences - terminale S spé
 
18:00
Objectifs : - Coder et décoder un message à l'aide d'un chiffrement de Hill - Etudier un exemple de chiffrement polyalphabétique - Calculer avec les matrices - inverse d'une matrice - Calculer avec les congruences Cours de mathématiques, terminale S, spécialité
Views: 7041 jaicompris Maths
Cryptographie cours : Principes fondamentaux
 
09:13
Vidéo présentant les principes fondamentaux en cryptographie. Le plan est le suivant : - Définition de la cryptographie , cryptanalyse - Les protagonistes habituels - Les termes utilisés - L'histoire du chiffrement - Le chiffrement "parfait" - Algorithme symétrique - Algorithme asymétrique ------------------------------------------------------------------------ Définition du modulo : Le modulo est le reste de la division euclidienne Exemple : 7 mod 3 = 1 29 mod 26 = 3 ------------------------------------------------------------------ Laissez moi en commentaire vos avis, vos suggestions ou les thèmes que vous voulez que j'aborde. Partagez la vidéo si elle vous a plus !
Views: 3310 Hack School
The Natural Riemann Surface Structure on an Algebraic Affine Nonsingular Plane Curve
 
01:09:14
An Introduction to Riemann Surfaces and Algebraic Curves: Complex 1-Tori and Elliptic Curves by Dr. T.E. Venkata Balaji, Department of Mathematics, IIT Madras. For more details on NPTEL visit http://www.nptel.iitm.ac.in/syllabus/111106044/ Goals of Lecture 44: * To show that the graph of a holomorphic function is naturally a Riemann surface embedded in complex affine 2-space * To use the Implicit Function Theorem to show that the zero locus of a nonsingular polynomial in two complex variables is naturally a Riemann surface embedded in complex affine 2-space * To show that the elliptic algebraic affine cubic plane curve associated to a punctured complex torus, as described in the previous lecture, has a natural Riemann surface structure which is holomorphically isomorphic to the natural Riemann surface structure on the punctured complex torus (inherited from the complex torus) Keywords for Lecture 44: Upper half-plane, complex torus associated to a lattice (or) grid in the plane, fundamental parallelogram associated to a lattice, doubly-periodic meromorphic function (or) elliptic function associated to a lattice, Weierstrass phe-function associated to a lattice, ordinary differential equation satisfied by the Weierstrass phe-function, zeros of the derivative of the Weierstrass phe-function, pole of order two (or) double pole with residue zero, triple pole (or) pole of order three, cubic equation, elliptic algebraic cubic curve, zeros of a polynomial equation, bicontinuous map (or) homeomorphism, open map, order of an elliptic function, elliptic integral, Argument principle, even function, odd function, analytic branch of the square root, simply connected, punctured torus, elliptic algebraic affine cubic plane curve, projective plane cubic curve, complex affine two-space, complex projective two-space, one-point compactification by adding a point at infinity, Implicit function theorem, graph of a holomorphic function, nonsingular (or) smooth polynomial in two variables, zero locus of a polynomial, solving an implicit equation locally for an explicit function, nonsingular (or) smooth point of the zero locus of a polynomial in two variables, Hausdorff, second countable, connected component, nonsingular cubic polynomial, discriminant of a polynomial, cubic discriminant
Views: 1189 nptelhrd
LFSR 1
 
10:14
An introduction to linear feedback shift registers, and their use in generating pseudorandom numbers for Vernam ciphers. For more cryptography, subscribe to my channel: https://www.youtube.com/channel/UC1KV5WfubHTV6E7sVCnTidw
Views: 33924 Jeff Suzuki
Cryptography- AFFINE CIPHER (TUTORIAL-2) BY-SHUBHAM KUMAR
 
15:03
this video deals with the overall idea of how to solve AFFINE cipher Encryption and Decryption problem.Do refer the playlist "Computer network " for more related videos
Views: 480 Learn it by Fun
Overview on S-Box Design Principles
 
51:06
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
Views: 29026 nptelhrd
Congruence - Comment déterminer le chiffre des unités de 7^98 - Spé Maths - Terminale S
 
09:10
objectifs: - Savoir calculer avec des congruences et connaitre les règles qu'on a le droit d'utiliser - Savoir utiliser les congruences pour trouver le chiffre des unités http://jaicompris.com/lycee/math/terminaleS-math.php Arithmétique - spé maths - terminale S - mathématiques
Views: 22537 jaicompris Maths
Keys And Kerchoffs Principle - Applied Cryptography
 
02:31
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 13138 Udacity
Linear Cryptanalysis
 
56:30
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
Views: 18391 nptelhrd
What is ID-BASED CRYPTOGRAPHY? What does ID-BASED CRYPTOGRAPHY mean? ID-BASED CRYPTOGRAPHY meaning
 
03:31
What is ID-BASED CRYPTOGRAPHY? What does ID-BASED CRYPTOGRAPHY mean? ID-BASED CRYPTOGRAPHY meaning - ID-BASED CRYPTOGRAPHY definition - ID-BASED CRYPTOGRAPHY explanation. Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license. SUBSCRIBE to our Google Earth flights channel - https://www.youtube.com/channel/UC6UuCPh7GrXznZi0Hz2YQnQ Identity-based cryptography is a type of public-key cryptography in which a publicly known string representing an individual or organization is used as a public key. The public string could include an email address, domain name, or a physical IP address. The first implementation of identity-based signatures and an email-address based public-key infrastructure (PKI) was developed by Adi Shamir in 1984, which allowed users to verify digital signatures using only public information such as the user's identifier. Under Shamir's scheme, a trusted third party would deliver the private key to the user after verification of the user's identity, with verification essentially the same as that required for issuing a certificate in a typical PKI. Shamir similarly proposed identity-based encryption, which appeared particularly attractive since there was no need to acquire an identity's public key prior to encryption. However, he was unable to come up with a concrete solution, and identity-based encryption remained an open problem for many years. The first practical implementations were finally devised by Sakai in 2000, and Boneh and Franklin in 2001. These solutions were based on bilinear pairings. Also in 2001, a solution was developed independently by Clifford Cocks. Identity-based systems allow any party to generate a public key from a known identity value such as an ASCII string. A trusted third party, called the private key generator (PKG), generates the corresponding private keys. To operate, the PKG first publishes a master public key, and retains the corresponding master private key (referred to as master key). Given the master public key, any party can compute a public key corresponding to the identity ID by combining the master public key with the identity value. To obtain a corresponding private key, the party authorized to use the identity ID contacts the PKG, which uses the master private key to generate the private key for identity ID. Identity-based systems have a characteristic problem in operation. Suppose Alice and Bob are users of such a system. Since the information needed to find Alice's public key is completely determined by Alice's ID and the master public key, it is not possible to revoke Alice's credentials and issue new credentials without either (a) changing Alice's ID (usually a phone number or an email address which will appear in a corporate directory); or (b) changing the master public key and re-issusing private keys to all users, including Bob. This limitation may be overcome by including a time component (e.g. the current month) in the identity.
Views: 436 The Audiopedia
Algorithme d'exponentiation rapide - Portail de la cryptographie
 
02:32
Dans cette vidéo, je vais vous expliquer de manière simple comment dérouler l'algorithme d'exponentiation rapide ou encore square-and-multiply ( en anglais ) prérequis : - Maîtriser les connaissances de bases en binaire : savoir comment passer d'une base décimale (10) à une base binaire (2) -Connaitre les propriétés du Modulo N'hésitez pas à partager ma vidéo ;)
Views: 2304 Kemiche Thiziri
Terminale S-Spécialité-Antilles septembre 2015 - sujet bac-chiffrement affine bézout
 
14:52
Terminale S-Spécialité-Antilles septembre 2015 - sujet bac-chiffrement affine bézout - C'est un sujet assez simple .
Multiplicative Inverse of 3 (mod 26)
 
07:36
How to use Euclid's Algorithm to find a multiplicative inverse of 3 (mod 26)
Views: 18425 Maths with Jay
Extended Euclidean Algorithm and Inverse Modulo Tutorial
 
06:00
Using EA and EEA to solve inverse mod.
Views: 415446 Emily Jane
PlayFair Cipher in Hindi – Complete Algorithm with Example
 
09:19
PlayFair Cipher in Hindi – Complete Algorithm with Example Like FB Page - https://www.facebook.com/Easy-Engineering-Classes-346838485669475/ Complete Data Structure Videos - https://www.youtube.com/playlist?list=PLV8vIYTIdSna11Vc54-abg33JtVZiiMfg Complete Java Programming Lectures - https://www.youtube.com/playlist?list=PLV8vIYTIdSnbL_fSaqiYpPh-KwNCavjIr Previous Years Solved Questions of Java - https://www.youtube.com/playlist?list=PLV8vIYTIdSnajIVnIOOJTNdLT-TqiOjUu Complete DBMS Video Lectures - https://www.youtube.com/playlist?list=PLV8vIYTIdSnYZjtUDQ5-9siMc2d8YeoB4 Previous Year Solved DBMS Questions - https://www.youtube.com/playlist?list=PLV8vIYTIdSnaPiMXU2bmuo3SWjNUykbg6 SQL Programming Tutorials - https://www.youtube.com/playlist?list=PLV8vIYTIdSnb7av5opUF2p3Xv9CLwOfbq PL-SQL Programming Tutorials - https://www.youtube.com/playlist?list=PLV8vIYTIdSnadFpRMvtA260-3-jkIDFaG Control System Complete Lectures - https://www.youtube.com/playlist?list=PLV8vIYTIdSnbvRNepz74GGafF-777qYw4
congruence • Savoir calculer avec modulo • Règles à connaitre et erreurs à éviter • arithmétique
 
13:03
Objectifs: - savoir calculer avec des congruences - modulo [n] - Les règles à connaitre , en particulier sur les puissances et équation - Les erreurs à éviter http://www.jaicompris.com/lycee/math/arithmetique/congruence-Z.php mathématiques - terminale S - spécialité maths - arithmétique
Views: 9622 jaicompris Maths
Matrices - partie 1 : définition
 
09:11
Chapitre "Matrices" - Partie 1 : Définition Plan : Définition ; Matrices particulières ; Addition de matrices ; Exo7. Cours et exercices de mathématiques pour les étudiants. Retrouvez le polycopié sur http://exo7.emath.fr
Views: 337880 Exo7Math
Gaël Thomas - Diffusion dans les schémas de Feistel généralisés
 
16:56
Diffusion dans les schémas de Feistel généralisés
Views: 390 Institut Fourier
CAPES MATH écrit 2018 2ieme epreuve  B IX   groupe cyclique generateur
 
16:15
http://media.devenirenseignant.gouv.fr/file/capes_externe/21/9/s2018_capes_externe_math_2_928219.pdf
Function example: Congruence functions (Screencast 6.1.5)
 
07:17
This video gives another example of function definitions, this time using integer congruence.
Views: 1901 GVSUmath
Primitive Roots Solution - Applied Cryptography
 
00:30
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 830 Udacity
La surcharge en C# avec Unity (Méthodes et Fonctions)
 
06:03
La Formation la plus complète du Web a prix discount : https://www.udemy.com/unity3d-formation-complete-developpeur-de-jeu-video/?couponCode=WEB-UPLN-24 http://www.upln.fr
Views: 664 Unity Pour les nuls
Cryptography trusted 3rd parties (basic key exchange)
 
11:12
trusted 3rd parties To get certificate subscribe: https://www.coursera.org/learn/crypto ======================== Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWYosqucluZghEVjUkopdD1e ======================== About this course: Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key.
Views: 544 intrigano
Substitution Cipher and Cryptanalysis
 
29:13
Subject:Computer Science Paper: Cryptography and network
Views: 311 Vidya-mitra
Complex Analysis  and algebraic geometry
 
18:57
In many ways, the modern revival of algebraic geometry resulted from investigations in complex function theory. In this video, we show how Weierstrass's p-function can be used to relate cubic curves and 2-tori. We see in particular that cubic curves have an abelian group structure. The material in this video and the other in the playlist can be found in Kirwan's "Complex algebraic curves".
Views: 2484 DanielChanMaths
matrice et évolution • suite • D'après sujet de BAC • spé maths • Terminale S 💡💡💡
 
16:05
Objectifs: - savoir traduire une situation à l'aide de suite et matrice - savoir calculer A^n - savoir étudier U(n+1)=AUn - comportement asymptotique de la suite de matrice: sa limite 💡💡💡: difficulté: normal type BAC http://jaicompris.com/lycee/math/matrice/matrice-suite.php terminale S - exercice type BAC - mathématiques
Views: 7432 jaicompris Maths
Complex Tori are the same as Elliptic Algebraic Projective Curves
 
36:19
An Introduction to Riemann Surfaces and Algebraic Curves: Complex 1-Tori and Elliptic Curves by Dr. T.E. Venkata Balaji, Department of Mathematics, IIT Madras. For more details on NPTEL visit http://www.nptel.iitm.ac.in/syllabus/111106044/ Goals of Lecture 45B: * In Part A of this lecture, we defined complex projective 2-space and showed how it can be turned into a two-dimensional complex manifold. In Part B, we show that any complex torus is holomorphically isomorphic to the natural Riemann surface structure on the associated elliptic algebraic cubic plane projective curve embedded in complex projective 2-space Keywords for Lecture 45B: Upper half-plane, complex torus associated to a lattice (or) grid in the plane, fundamental parallelogram associated to a lattice, doubly-periodic meromorphic function (or) elliptic function associated to a lattice, Weierstrass phe-function associated to a lattice, ordinary differential equation satisfied by the Weierstrass phe-function, zeros of the derivative of the Weierstrass phe-function, pole of order two (or) double pole with residue zero, triple pole (or) pole of order three, cubic equation, elliptic algebraic cubic curve, zeros of a polynomial equation, bicontinuous map (or) homeomorphism, open map, order of an elliptic function, elliptic integral, Argument principle, even function, odd function, analytic branch of the square root, simply connected, punctured torus, elliptic algebraic affine cubic plane curve, projective plane cubic curve, complex affine two-space, complex projective two-space, one-point compactification by adding a point at infinity, Implicit function theorem, graph of a holomorphic function, nonsingular (or) smooth polynomial in two variables, zero locus of a polynomial, solving an implicit equation locally for an explicit function, nonsingular (or) smooth point of the zero locus of a polynomial in two variables, Hausdorff, second countable, connected component, nonsingular cubic polynomial, discriminant of a polynomial, cubic discriminant, homogeneous coordinates on projective 2-space, punctured complex 3-space, quotient topology, open map, complex two-dimensional manifold (or) complex surface, complex one-dimensional manifold (or) Riemann surface, complex coordinate chart in two complex variables, holomorphic (or) complex analytic function of two complex variables, glueing of Riemann surfaces, glueing of complex planes, zero set of a homogeneous polynomial in projective space, degree of homogeneity, Euler's formula for homogeneous functions, homogenisation, dehomogenisation, a complex curve is a real surface, a complex surface is a real 4-manifold
Views: 2110 nptelhrd
Hierarchical Identity Based Encryption from Affine Messafe Authentication
 
18:04
Presentation at Crypto 2014. Paper by Olivier Blazy and Eike Kiltz and Jiaxin Pan. http://www.iacr.org/cryptodb/data/paper.php?pubkey=25179
Views: 1121 TheIACR
Cipher Solver - Encoding Tool Pro
 
03:16
Since ancient times the use of confidential letter was very popular, confidential letter provides confidential nature to contact, communication and exchange with each other tight ... Over the centuries humans have created thousands of confidential different letter from simple to complex. They use everything they can think that would be a confidential letter unknown as images, water, fire, light ... when you want to send a message something to someone to make that information This message recipient is the only person reading it. Today password or encrypted mail, referring stocks lifted by higher technology and more complex with a variety of language and mathematical codes, arithmetic, color code ... so the solution becomes the secret message more difficult but also more interesting. Download Android: https://play.google.com/store/apps/details?id=icetea.encode.createsecretcode Applications "Cipher Decoder - Cipher Solver" will help you do not need to know the password can create very interesting letter secret passage in less than 1 second. We support these types of encryption: - ASCII cipher (Change content of a standard code ascii letters) - Binary cipher (Jump into binary code) - Caesar cipher (Swap simple words) - Hexadecimal cipher (Jump into hexadecimal code generation 16)) - Rearrange words cipher (Reverse text from beginning to end) - Vigennere cipher(Swap the word complex, difficult to detect than text caesar) - Rearrange words cipher (Change the order of words) - Atbash cipher (Swap words) - Affine cipher (Swap words) - Letter Number cipher (Switch the number of characters) - Morse cipher (Using a standardized sequence of elements of short-term and to perform content) + Function Translate - bile mail if you know which type of encryption that uses confidential letter, with features shared via facebook, email ... promise this will be the interesting conversations that only you and people new to understand. + Function Mycodes - Save the confidential letter that has been initialized --------------------------------------------- ♥ For the application "Cipher Decoder - Cipher Solver" better look forward to the assessment and the comments of you. Download Android: https://play.google.com/store/apps/details?id=icetea.encode.createsecretcode
Views: 43008 Ứng dụng Việt
PART - 1 : What is HASH in Cryptography || Hashing Algorithms || Avalanche Effect (Hindi)
 
13:06
In this video....We are discussing about HASH and HASHING ALGORITHMS. How the Avalanche Effect happens in cryptographic Hash. Video Recommended : https://youtu.be/ycGvKzjjXEM Join Telegram Channel : http://t.me/technail Thanks For Watching.
Views: 89 Tech Nail
Loi binomiale partie 7 : Transformation affine
 
04:20
Iic, je vous démontre les conséquences des transformations affines. N'oubliez pas, les mathématiques forment la force mentale
Views: 309 Arca Libre
Random Oracle - Applied Cryptography
 
00:44
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 3640 Udacity
Suites - partie 5 : suites récurrentes
 
22:02
Chapitre "Suites" - Partie 5 : Suites récurrentes Plan : Convergence ; cas d'une fonction croissante ; cas d'une fonction décroissante Exo7. Cours et exercices de mathématiques pour les étudiants. Retrouvez le polycopié sur http://exo7.emath.fr
Views: 66629 Exo7Math
Identity-Based (Lossy) Trapdoor Functions and Applications.
 
23:58
Talk at eurocrypt 2012. Authors: Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=24244
Views: 1185 TheIACR
Data security using cryptography and steganography
 
07:52
Data security and encryption using Cryptography and Steganography techniques
Information & Network Security Lecture - - Substitution Techniques (Eng-Hindi)
 
20:44
-~-~~-~~~-~~-~- Please watch: "PL vs FOL | Artificial Intelligence | (Eng-Hindi) | #3" https://www.youtube.com/watch?v=GS3HKR6CV8E -~-~~-~~~-~~-~-
Views: 45139 Well Academy
Hill Cipher in Hindi – Complete Algorithm with Example
 
07:57
Hill Cipher in Hindi – Complete Algorithm with Example Like FB Page - https://www.facebook.com/Easy-Engineering-Classes-346838485669475/ Complete Data Structure Videos - https://www.youtube.com/playlist?list=PLV8vIYTIdSna11Vc54-abg33JtVZiiMfg Complete Java Programming Lectures - https://www.youtube.com/playlist?list=PLV8vIYTIdSnbL_fSaqiYpPh-KwNCavjIr Previous Years Solved Questions of Java - https://www.youtube.com/playlist?list=PLV8vIYTIdSnajIVnIOOJTNdLT-TqiOjUu Complete DBMS Video Lectures - https://www.youtube.com/playlist?list=PLV8vIYTIdSnYZjtUDQ5-9siMc2d8YeoB4 Previous Year Solved DBMS Questions - https://www.youtube.com/playlist?list=PLV8vIYTIdSnaPiMXU2bmuo3SWjNUykbg6 SQL Programming Tutorials - https://www.youtube.com/playlist?list=PLV8vIYTIdSnb7av5opUF2p3Xv9CLwOfbq PL-SQL Programming Tutorials - https://www.youtube.com/playlist?list=PLV8vIYTIdSnadFpRMvtA260-3-jkIDFaG Control System Complete Lectures - https://www.youtube.com/playlist?list=PLV8vIYTIdSnbvRNepz74GGafF-777qYw4
Learning the One Time Pad algorithm with Chosen Plaintext Attack Adversarial Neural Cryptography
 
02:41
Talk by Murilo Coutinho Silva, presented at Eurocrypt 2017 Rump Session.
Views: 326 TheIACR
Apprendre à programmer avec SCRATCH #1
 
15:37
Dans cette vidéo, tu pourras apprendre à programmer avec le logiciel SCRATCH. Cette 1ère vidéo d'une série de 4 permet de prendre en main le logiciel et de découvrir les commandes de base. 👍 Télécharger Scratch : https://scratch.mit.edu/scratch2download/ Site officiel : http://www.maths-et-tiques.fr Twitter : https://twitter.com/mtiques Facebook : https://www.facebook.com/mathsettiques/ Instagram : https://www.instagram.com/yvanmonka/
Views: 213832 Yvan Monka
Seminar@SystemX - Daniel Augot - Fonctions de hachage et blockchains
 
01:29:38
La preuve de travail (proof-of-work) est une manière robuste de permettre une élection du validateur du bloc courant dans les blockchains sans autorisations (permissionless). Dans Bitcoin a été choisie la fonction de hachage SHA256, « prise sur étagère », et une course à la puissance s’en est suivie, avec du matériel de plus en plus spécailisé pour miner (CPU, GPU, FPGA, ASIC), à l’encontre de la vision décentralisatrice des origines. Litecoin est une blockchain assez ancienne, qui utilise une autre fonction de hachage censée être résistante à l’optimisation matérielle. Ethereum a conçu sa propre fonction de hachae, zcash utilise equihash, iota a conçu une fonction qui a été « cassée », etc. Dans ce exposé, on étudiera ces fonctions, et les différents choix de fonction de hachage pour l’élection du mineur gagnant dans ces blockchain.
Views: 403 IRT SystemX
Atbash Cipher Encryption in VB 2015
 
08:05
In this video, you'll learn how to make a text encryption function using Atbash Cipher algorithm in Visual Basic using Visual Studio 2015. Source Code: http://blog.basseltech.com/atbash-cipher-encryption-in-vb-2015
Views: 1376 BasselTech