Section 7

Flowchart of the demo application's implementation of the HCSSES algorithm

This flowchart shows the implementation used in the demonstration application, which uses a single key to encrypt and decrypt.

The key is created from fusing the application signature and the user's password.

The application signature is generated to produce a good spread indifferent to the affects of the user's password ( thus allowing them to input anything ).

The demo is also set up to compress the output data to reduce data expansion.




Author: David Bishop

Last updated: Mar 4, 2011

WXC