Can you briefly explain to me how an attacker would break this?
Pretty much the same way you would break rot 13 or any other substitution cipher, easily
In reply to Re^3: Encryption using perl core functions only
by Anonymous Monk
in thread Encryption using perl core functions only
by redhotpenguin
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |