ASCII code table

In the EMA system, both the key and the data source are sets of bytes stored in files and/or RAM. Keys can be generated randomly using simple algorithms or even manually. Each key element is naturally and closely related to its unique progressive index. Once generated, it is used to mask a source and cannot be modified. Only the same key that was used to mask the source data can unmask the masked data. All files, whether they contain keys or source data, whether they are encrypted or decrypted, consist of 256 ASCII characters/bytes.

1st column=decimal unsigned value
2nd column=signed decimal value
3rd column=corresponding character (depends on the encoding used)
000000NUL     032032space   064064@      096096`        128-128Ç      160-096á      192-064└      224-032α     
001001SOH033033!065065A097097a129-127ü161-095í193-063225-031ß
002002STX034034066066B098098b130-126é162-094ó194-062226-030Γ
003003ETX035035#067067C099099c131-125â163-093ú195-061227-029π
004004EOT036036$068068D100100d132-124ä164-092ñ196-060228-028Σ
005005ENQ037037%069069E101101e133-123à165-091Ñ197-059229-027σ
006006ACK038038&070070F102102f134-122å166-090ª198-058230-026µ
007007BEL039039071071G103103g135-121ç167-089º199-057231-025ß
008008BS040040(072072H104104h136-120ê168-088¿200-056232-024τ
009009HT041041)073073I105105i137-119ë169-087201-055233-023Φ
010010LF/NL042042*074074J106106j138-118è170-086¬202-054234-022Θ
011011VT043043+075075K107107k139-117ï171-085½203-053235-021Ω
012012FF044044,076076L108108l140-116î172-084¼204-052236-020δ
013013CR045045077077M109109m141-115ì173-083¡205-051237-019
014014SO046046.078078N110110n142-114Ä174-082«206-050238-018φ
015015SI047047/079079O111111o143-113Å175-081»207-049239-017ε
016016DLE0480480080080P112112p144-112É176-080208-048240-016
017017DC10490491081081Q113113q145-111§177-079209-047241-015
018018DC20500502082082R114114r146-110Æ178-078210-046242-014±
019019DC30510513083083S115115s147-109ô179-077211-045243-013
020020DC40520524084084T116116t148-108ö180-076212-044244-012
021021NAK0530535085085U117117u149-107ò181-075213-043245-011
022022SYN0540546086086V118118v150-106û182-074214-042246-010
023023ETB0550557087087W119119w151-105ù183-073215-041247-009÷
024024CAN0560568088088X120120x152-104ÿ184-072216-040248-008
025025EM0570579089089Y121121y153-103Ö185-071217-039249-007°
026026SUB058058:090090Z122122z154-102Ü186-070218-038250-006
027027ESC059059;091091[123123{155-101¢187-069219-037251-005·
028028FS060060<092092\124124|156-100£188-068220-036252-004
029029GS061061=093093]125125}157-099¥189-067221-035253-003
030030RS062062>094094^126126~158-098190-066222-034254-002²
031031US063063?095095_127127DEL159-097ƒ191-065223-033255-001

ASCII code table (ANSI encoding) containing the bytes that make up the keys and all data sources.
You can see in the form three columns for each byte/character (unsigned decimal, signed decimal, and character).
The display of characters depends on the encoding set used. Many of them are not printable.

The key is applied to the data source by a known and public masking technique generating the encrypted data, which is a set of data of the same length as the data source plus a limited number of bytes, (additional data) that are used to make the checks needed in the subsequent unmasking/decryption stage.

The masked data content may not be the same as the original data and may be mixed within blocks of the same length as the key. For example, using the replacement technique with a 1024 bytes long key, data is replaced within each 1024 byte blocks of the data source. Almost the same is true for shuffling.

Once the data source has been encrypted, the loss of the key means that it is impossible to decrypt the data and thus get back the original data.

Someone who wanted to decrypt the data source would have to be able to recreate the exact keys. Guessing a 512KB long key means finding it among 256524.288 of possible theoretical combinations. Furthermore, finding a sequence of characters with complete meaning (plain text or binary) is neither the same as having found the key nor being sure that the “decrypted” string is correct.

Note
Bytes can be represented in a number of ways. As unsigned integers from 0 to 255, as signed integers from -128 to 127, and as characters (many of which cannot be displayed). For convenience, they are represented as unsigned integers from 0 to 255 and as relative characters (ANSI encoding).

Scroll to Top