learn encryption techniques with basic and c

learn encryption techniques with basic and c - Brief Full...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Brief Full Advanced Search Search Tips To access the contents, click the chapter and section titles. Learn Encryption Techniques with BASIC and C++ (Publisher: Wordware Publishing, Inc.) Author(s): Gil Held ISBN: 1556225989 Publication Date: 10/01/98 Search this book: Preface About the CD About the Author Chapter 1—Technology and Terminology Ciphers Versus Codes Cipher Terminology Plaintext and Enciphered Text Encipherment Decipherment Keys and Key Space Types of Encryption Systems Key Generation, Management, and Distribution Types of Ciphers Substitution Cipher Systems Transposition Cipher Systems Electronic Mail Transmission Considerations Subroutines and Programs File Naming Conventions Chapter 2—Monoalphabetic Substitution Concepts Evolution Alphabets Alphabetic Relationships Displacement Alphabets Encipherment Decipherment Automating Operations Using an Alphabetic Shift Key Converting to Ciphertext The MSGENCIPHER Subroutine The CIPHER2.CPP Program Limiting the Effect of Errors The GROUPBY5 Subroutine The CIPHER3.BAS Program The CIPHER3.CPP Program Processing Multiple-Line Messages The MSGFILE Subroutine The CONVERTSTORE Subroutine The PRTOUT Subroutine Modifying the GROUPBY5 Subroutine The CIPHER4.BAS Program The CIPHER4.CPP Program The DCIPHER4.BAS Program The DMSGFILE Subroutine The DECIPHER Subroutine The DPRTOUT Subroutine The DCIPHER4.CPP Program Chapter 3—Keyword-Based Monoalphabetic Substitution Keyword-Based Mixed Alphabets Construction Automating Keyword Construction The KEYWORD Subroutine Incorporating an Alphabetic Shift Key The CIPHER5.BAS Program The Encipherment Process The CIPHER5.CPP Program Deciphering Operations The Decipherment Process The DCIPHER5.BAS Program The DCIPHER5.CPP Program Alternative Relationships Weaknesses Chapter 4—Transposition-based Monoalphabetic Substitution Matrix-Based Transposition Simple Transposition Encipherment Decipherment Numeric Transposition Encipherment and Decipherment Other Variations Interval Extraction Encipherment and Decipherment Automating Matrix-Based Systems Encipherment The TRANSPORT Subroutine The CIPHERTR.BAS Program The INTERVAL Subroutine The TRANSPORT.CPP Program The CIPHERTR.CPP Program The CIPHER6.BAS Program The CIPHER6.CPP Program Decipherment The DCIPHER6.BAS Program The DCIPHER6.CPP Program Monoalphabetic Combinations Chapter 5—Polyalphabetic Substitution Simple Polyalphabetic Substitution Systems The Vigenére Cipher The POLY1.BAS Program The POLY1.CPP Program Encipherment Other Polyalphabetic Substitution Methods Periodic Polyalphabetic Substitution Operation Reducing Probability of Decipherment The POLY2.BAS Program The PFORMCIPHER Subroutine The PCONVERTSTORE Subroutine Program Execution The COUNT.CPP Program The POLY2.CPP Program The DPOLY2.BAS Program The DMSGFILE Subroutine The DPCONVERTSTORE Subroutine Program Execution The DPOLY2.CPP Program Chapter 6—Using Random Numbers Random Numbers and Random Number Sequences Generating Random Number Sequences Pseudo-random Number Sequences...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Page1 / 380

learn encryption techniques with basic and c - Brief Full...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online