Flylib.com
90.
Previous page
Table of content
Next page
Learn Encryption Techniques with BASIC and C++
(Publisher: Wordware Publishing, Inc.)
Author(s): Gil Held
ISBN: 1556225989
Publication Date: 10/01/98
Preface
About the CD
About the Author
Chapter 1Technology and Terminology
Ciphers Versus Codes
Cipher Terminology
Plaintext and Enciphered Text
Encipherment
Decipherment
Keys and Key Space
Types of Encryption Systems
Key Generation, Management, and Distribution
Types of Ciphers
Substitution Cipher Systems
Transposition Cipher Systems
Electronic Mail Transmission Considerations
Subroutines and Programs
File Naming Conventions
Chapter 2Monoalphabetic Substitution Concepts
Evolution
Alphabets
Alphabetic Relationships
Displacement Alphabets
Encipherment
Decipherment
Automating Operations
Using an Alphabetic Shift Key
Converting to Ciphertext
The MSGENCIPHER Subroutine
The CIPHER2.CPP Program
Limiting the Effect of Errors
The GROUPBY5 Subroutine
The CIPHER3.BAS Program
The CIPHER3.CPP Program
Processing Multiple-Line Messages
The MSGFILE Subroutine
The CONVERTSTORE Subroutine
The PRTOUT Subroutine
Modifying the GROUPBY5 Subroutine
The CIPHER4.BAS Program
The CIPHER4.CPP Program
The DCIPHER4.BAS Program
The DMSGFILE Subroutine
The DECIPHER Subroutine
The DPRTOUT Subroutine
The DCIPHER4.CPP Program
Chapter 3Keyword-Based Monoalphabetic Substitution
Keyword-Based Mixed Alphabets
Construction
Automating Keyword Construction
The KEYWORD Subroutine
Incorporating an Alphabetic Shift Key
The CIPHER5.BAS Program
The Encipherment Process
The CIPHER5.CPP Program
Deciphering Operations
The Decipherment Process
The DCIPHER5.BAS Program
The DCIPHER5.CPP Program
Alternative Relationships
Weaknesses
Chapter 4Transposition-based Monoalphabetic Substitution
Matrix-Based Transposition
Simple Transposition
Encipherment
Decipherment
Numeric Transposition
Encipherment and Decipherment
Other Variations
Interval Extraction
Encipherment and Decipherment
Automating Matrix-Based Systems
Encipherment
The TRANSPORT Subroutine
The CIPHERTR.BAS Program
The INTERVAL Subroutine
The TRANSPORT.CPP Program
The CIPHERTR.CPP Program
The CIPHER6.BAS Program
The CIPHER6.CPP Program
Decipherment
The DCIPHER6.BAS Program
The DCIPHER6.CPP Program
Monoalphabetic Combinations
Chapter 5Polyalphabetic Substitution
Simple Polyalphabetic Substitution Systems
The Vigenére Cipher
The POLY1.BAS Program
The POLY1.CPP Program
Encipherment
Other Polyalphabetic Substitution Methods
Periodic Polyalphabetic Substitution
Operation
Reducing Probability of Decipherment
The POLY2.BAS Program
The PFORMCIPHER Subroutine
The PCONVERTSTORE Subroutine
Program Execution
The COUNT.CPP Program
The POLY2.CPP Program
The DPOLY2.BAS Program
The DMSGFILE Subroutine
The DPCONVERTSTORE Subroutine
Program Execution
The DPOLY2.CPP Program
Chapter 6Using Random Numbers
Random Numbers and Random Number Sequences
Generating Random Number Sequences
Pseudo-random Number Sequences
The RND Function
RANDOMIZE Statement
Working with Random Numbers
The RANDOM1.BAS Program
The RANDOM2.BAS Program
The RANDOM1.CPP Program
The RANDOM2.CPP Program
Modulo 26 Arithmetic
The DRANDOM2.BAS Program
The DRANDOM2.CPP Program
Constructing an Enciphering Program
Extending the Random Process
Extending the Combinations
Creating Your Own Random Number Generator
Program Development
The POSITION.BAS Program
The POSITION.CPP Program
The RTEST.BAS Program
The RANDOM3.BAS Program
The RCONVERTSTORE Subroutine
The RANDOM3.CPP Program
The DRANDOM3.BAS Program
The RDCONVERTSTORE Subroutine
The DRANDOM3.CPP Program
An Alternative Random Process
The ROTOR.BAS Program
Chapter 7Developing Practical Programs
Module Utilization
The ENCIPHER.EXE Program
The DECIPHER.EXE Program
The Challenge
Chapter 8Public Key Encryption
General Operation
Authentication Issues
Public vs. Private Key Encryption
Advantages and Disadvantages
Understanding the Mathematics
Modular Arithmetic
Modular Addition
Modular Subtraction
Modular Multiplication
Finding the Multiplicative Inverse
Prime Numbers
The Euclidean Algorithm
The Totient Function
RSA
Public Key Generation
Private Key Generation
Message Encipherment
Exponentiation Operations
Facilitating the Key Generation Process
Locating Large Primes
Summary
Appendix A
Index
Previous page
Table of content
Next page
Learn Encryption Techniques with BASIC and C++
ISBN: 1556225989
EAN: 2147483647
Year: 2005
Pages: 92
Authors:
Gil Held
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling
Configuring, Manipulating, and Reusing ORM Models
Reverse Engineering and Importing to ORM
Editing Logical Models”Advanced Aspects
Change Propagation and Round Trip Engineering
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Characters, Strings, and Text Output
Making Programs Think Branching Statements and Subroutines
Game Graphics Learning to Use Bitmaps
Playing Some Tunes CD Audio, MIDI and MP3 Music
Fundamentals of 3D Graphics Programming
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Prerequisites
Working with Data in PostgreSQL
Character Values
PostgreSQL SQL Syntax and Use
Summary
The Java Tutorial: A Short Course on the Basics, 4th Edition
Grouping Threads
Using the Streams
Why Is Thread.stop Deprecated?
Operator Precedence
Integrated Development Environments
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
The Internationalization of the Retail Supply Chain
Fashion Logistics and Quick Response
Temperature-Controlled Supply Chains
Rethinking Efficient Replenishment in the Grocery Sector
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the TNS Listener and Dispatchers
Oracle and PL/SQL
Running Operating System Commands
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies