Project Codename: Runge Kutta

Posted: December 29, 2010 by Jinkchak in Programming, RVCE, RVCE CSE

Welcome to Jinkchak(TM)’s last publication in the year 2010 AD!



Have you ever wanted to encrypt a file? Sure, I agree that there are plenty of programs that allow you to do this and more. But isn’t it nice to have a C program built just for that purpose – a program you can understand.


Click on the link above, to download the first prototype of Project Codename: RUNGE KUTTA developed by the 21st Century Me…yeah ME! Production Company!


It’s a C program to encrypt and decrypt any text document using the Caesar Shift. The password is “jinkchak”



The Source code is available here :

Extract all the contents of the zipped file (This step is important). Run TCDEF.exe.Initially, the program will ask you for a password. The password is “jinkchak”(all lowercase without the quotes). The characters you type will not be echoed to the screen. Instead, only asterisks will be displayed. The backspace key is also supported, though there are a few bugs. The space bar terminates the input (couldn’t put the ‘\n’ character as a terminator, for reasons I am yet to find out – the program enters an infinite loop if any escape sequence is put in the test condition).

The program comes bundled with the .exe file along with two text documents labeled ENCRYPT.txt and DECODE.txt

ENCRYPT.txt is where all encrypted data is stored. DECODE.txt can be used in two ways. It can be used as the output file for ENCRYPT.txt. It can also be used as an input file. The data that has to be encrypted is pasted in DECODE.txt. Using the program, the data stored in this file can be converted into encrypted form. The encrypted data will always be saved in ENCRYPT.txt, and the contents of DECODE.txt will be deleted.

Do not change the names of these files.


  • The program has to be exited, before any of the files can be viewed, because all decrypted data is stored in a buffer, which is written to a file only after the program is terminated.
  • Neither ENCRYPT.txt nor DECODE.txt should be open while the program is being executed.
  • The encryption and decryption is not case-sensitive.
  • At every menu, please enter appropriate inputs. Entering invalid characters will lead to unpredictable behavior (This is still an unstable version)


—Created entirely on Turbo C 3.0 with heavy dependence on the Conio header file. Hence, it’s incompatible with any GCC compiler.
—This program was created because the author was tired of Carl Hamacher and other similar people.
—Never remind the author about Carl Hamacher.

—This program is not related to the two Mathematicians – Runge and Kutta, in any way whatsoever. The only reason that this project was named after them was because the author was nearly driven to craziness (if such a word may be used) by their 4th order method.

2010(C) Copyleft The 21st Century Me…yeah ME! Production Company
Jinkchak and other related products are the properties of their respective owners.
Any part of this program may be distributed free of charge.


  1. bsv0099 says:

    Simply superb 🙂

  2. Anonymous says:


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s