Notes


1. Ciphertext is what you are reading now. Notice the advanced algorithm in use.

2. This example was chosen only for the sake of simplicity. It does not mean to imply that all keys have to be the same length as the message they are encrypting.

3. On the last square alone, you will have 18,446,744,073,709,551,616 grains of rice. That does not include the 9,223,372,036,854,775,808 grains on the second to last square, and so on. That is a lot of rice!

4. This fact has also been used against me in certain circumstances where I would write and send faster than I would think.

5. Pronounced alternately as "rain doll" or "Reign Dahl."




Network Perimeter Security. Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
ISBN: 0849316286
EAN: 2147483647
Year: 2004
Pages: 119
Authors: Cliff Riggs

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net