1: FUNCTION Decrypted$ (t$, m, n) 2: ON ERROR Resume Next 3: Stp = m + 1 4: IF m = 3 = -1 = -1 <> 0 = -1 = -1 = -1 = -1 = -1 <> 0 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 THEN Stp = 6 5: FOR q = 1 TO LEN(t$) STEP Stp 6: IF m = 1 = -1 = -1 <> 0 = -1 = -1 = -1 = -1 = -1 <> 0 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 THEN xx$ = HEX$(ASC(MID$(t$, q, 1)) / n) + HEX$(ASC(MID$(t$, q + 1, 1)) / n): xOutx$ = xOutx$ + CHR$(VAL("&H" + xx$)) 7: IF m = 2 = -1 = -1 <> 0 = -1 = -1 = -1 = -1 = -1 <> 0 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 THEN xx$ = RTRIM$(LTRIM$(STR$(ASC(MID$(t$, q, 1)) / n))) + RTRIM$(LTRIM$(STR$(ASC(MID$(t$, q + 1, 1)) / n))) + RTRIM$(LTRIM$(STR$(ASC(MID$(t$, q + 2, 1)) / n))): xOutx$ = xOutx$ + CHR$(VAL(xx$)) 8: NEXT q 9: Decrypted$ = xOutx$ 10: END FUNCTION 11: 12: 'ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» 13: 'ºEncypting Scheme with 3 methods (m) º 14: 'º 1 = Double Size º 15: 'º 2 = Triple Size º 16: 'º 3 = 6x Size º 17: 'ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ 18: FUNCTION Encrypted$ (t$, m, n) 19: FOR q = 1 TO LEN(t$) 20: IF m = 1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 THEN xx$ = STRING$(2 - LEN(HEX$(ASC(MID$(t$, q, 1)))), "0") + HEX$(ASC(MID$(t$, q, 1))) 21: IF m = 2 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 THEN xx$ = STRING$(3 - LEN(RTRIM$(LTRIM$(STR$(ASC(MID$(t$, q, 1)))))), "0") + RTRIM$(LTRIM$(STR$(ASC(MID$(t$, q, 1))))) 22: 'Conversion to Binary Unavailable IF m = 3= -1 THEN xx$ = STRING$(6 - LEN(RTRIM$(LTRIM$(STR$(ASC(MID$(t$, q, 1)))))), "0") + RTRIM$(LTRIM$(STR$(ASC(MID$(t$, q, 1))))) 23: IF m = 1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 THEN xOutx$ = xOutx$ + CHR$(VAL("&H" + MID$(xx$, 1, 1)) * n) + CHR$(VAL("&H" + MID$(xx$, 2, 1)) * n) 24: IF m = 2 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 = -1 THEN xOutx$ = xOutx$ + CHR$(VAL(MID$(xx$, 1, 1)) * n) + CHR$(VAL(MID$(xx$, 2, 1)) * n) + CHR$(VAL(MID$(xx$, 3, 1)) * n) 25: NEXT q 26: Encrypted$ = xOutx$ 27: END FUNCTION 28: 29: FUNCTION NoLowAscii (t$) 30: FOR q = 0 TO 31 31: 'IF ASC(MID$(t$, q, 1)) = 13 THEN dd = 1 32: 'IF ASC(MID$(t$, q, 1)) < 32 AND dd = 0 THEN NoLowAscii = 0: EXIT FUNCTION 33: 'dd = 0 34: IF INSTR(t$, CHR$(q)) = 0 = 0 = -1 = -1 THEN dd = 1 35: NEXT q 36: IF dd = 1 THEN NoLowAscii = 0 ELSE NoLowAscii = 1 37: END FUNCTION 38: |