⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ewtoc.html

📁 这个是密码学的经典著作
💻 HTML
字号:
<html><head><TITLE>Learn Encryption Techniques with BASIC and C++ - Table of Contents</TITLE><!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Learn Encryption Techniques with BASIC and C++</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: Wordware Publishing, Inc.)</I>
<BR>
Author(s): Gil Held
<BR>
ISBN: 1556225989
<BR>
Publication Date: 10/01/98
</FONT></CENTER>
<P>

<!-- Empty Reference Subhead --><!--ISBN=1556225989//--><!--TITLE=Learn Encryption Techniques with BASIC and C++//--><!--AUTHOR=Gilbert Held//--><!--PUBLISHER=Wordware Publishing, Inc.//--><!--CHAPTER=0//--><!--PAGES=0//--><!--UNASSIGNED1//--><!--UNASSIGNED2//--><DL><FONT SIZE="4"><B><DD><A HREF="index.html">Preface</A><DD><A HREF="about.html">About the CD</A><DD><A HREF="about_author.html">About the Author</A></B></FONT><BR><BR><DD><A HREF="ch01/001-004.html#Heading1"><FONT SIZE="4"><B>Chapter 1&#151;Technology and Terminology</B></FONT></A><FONT SIZE="3"><B><DL><DD><A HREF="ch01/001-004.html#Heading2">Ciphers Versus Codes</A><DD><A HREF="ch01/004-006.html#Heading3">Cipher Terminology</A><DL><DD><A HREF="ch01/004-006.html#Heading4">Plaintext and Enciphered Text</A><DD><A HREF="ch01/004-006.html#Heading5">Encipherment</A><DD><A HREF="ch01/006-009.html#Heading6">Decipherment</A><DD><A HREF="ch01/006-009.html#Heading7">Keys and Key Space</A><DD><A HREF="ch01/009-011.html#Heading8">Types of Encryption Systems</A><DD><A HREF="ch01/012-014.html#Heading9">Key Generation, Management, and Distribution</A></DL><DD><A HREF="ch01/014-016.html#Heading10">Types of Ciphers</A><DL><DD><A HREF="ch01/014-016.html#Heading11">Substitution Cipher Systems</A><DD><A HREF="ch01/016-019.html#Heading12">Transposition Cipher Systems</A></DL><DD><A HREF="ch01/016-019.html#Heading13">Electronic Mail Transmission Considerations</A><DD><A HREF="ch01/019-022.html#Heading14">Subroutines and Programs</A><DL><DD><A HREF="ch01/019-022.html#Heading15">File Naming Conventions</A></DL></DL></B></FONT><BR><DD><A HREF="ch02/023-025.html#Heading1"><FONT SIZE="4"><B>Chapter 2&#151;Monoalphabetic Substitution Concepts</B></FONT></A><FONT SIZE="3"><B><DL><DD><A HREF="ch02/023-025.html#Heading2">Evolution</A><DD><A HREF="ch02/023-025.html#Heading3">Alphabets</A><DL><DD><A HREF="ch02/025-029.html#Heading4">Alphabetic Relationships</A><DD><A HREF="ch02/025-029.html#Heading5">Displacement Alphabets</A><DD><A HREF="ch02/029-032.html#Heading6">Encipherment</A><DD><A HREF="ch02/032-035.html#Heading7">Decipherment</A></DL><DD><A HREF="ch02/032-035.html#Heading8">Automating Operations</A><DL><DD><A HREF="ch02/032-035.html#Heading9">Using an Alphabetic Shift Key</A><DD><A HREF="ch02/039-042.html#Heading10">Converting to Ciphertext</A><DL><DD><A HREF="ch02/039-042.html#Heading11">The MSGENCIPHER Subroutine</A><DD><A HREF="ch02/042-047.html#Heading12">The CIPHER2.CPP Program</A></DL><DD><A HREF="ch02/047-050.html#Heading13">Limiting the Effect of Errors</A><DL><DD><A HREF="ch02/047-050.html#Heading14">The GROUPBY5 Subroutine</A><DD><A HREF="ch02/047-050.html#Heading15">The CIPHER3.BAS Program</A><DD><A HREF="ch02/050-056.html#Heading16">The CIPHER3.CPP Program</A></DL><DD><A HREF="ch02/056-060.html#Heading17">Processing Multiple-Line Messages</A><DL><DD><A HREF="ch02/056-060.html#Heading18">The MSGFILE Subroutine</A><DD><A HREF="ch02/056-060.html#Heading19">The CONVERTSTORE Subroutine</A><DD><A HREF="ch02/060-063.html#Heading20">The PRTOUT Subroutine</A><DD><A HREF="ch02/063-068.html#Heading21">Modifying the GROUPBY5 Subroutine</A><DD><A HREF="ch02/063-068.html#Heading22">The CIPHER4.BAS Program</A><DD><A HREF="ch02/068-081.html#Heading23">The CIPHER4.CPP Program</A><DD><A HREF="ch02/081-084.html#Heading24">The DCIPHER4.BAS Program</A><DD><A HREF="ch02/081-084.html#Heading25">The DMSGFILE Subroutine</A><DD><A HREF="ch02/084-088.html#Heading26">The DECIPHER Subroutine</A><DD><A HREF="ch02/084-088.html#Heading27">The DPRTOUT Subroutine</A><DD><A HREF="ch02/088-094.html#Heading28">The DCIPHER4.CPP Program</A></DL></DL></DL></B></FONT><BR><DD><A HREF="ch03/095-098.html#Heading1"><FONT SIZE="4"><B>Chapter 3&#151;Keyword-Based Monoalphabetic Substitution</B></FONT></A><FONT SIZE="3"><B><DL><DD><A HREF="ch03/095-098.html#Heading2">Keyword-Based Mixed Alphabets</A><DL><DD><A HREF="ch03/095-098.html#Heading3">Construction</A><DD><A HREF="ch03/095-098.html#Heading4">Automating Keyword Construction</A><DL><DD><A HREF="ch03/098-100.html#Heading5">The KEYWORD Subroutine</A></DL><DD><A HREF="ch03/100-104.html#Heading6">Incorporating an Alphabetic Shift Key</A><DL><DD><A HREF="ch03/104-125.html#Heading7">The CIPHER5.BAS Program</A><DD><A HREF="ch03/104-125.html#Heading8">The Encipherment Process</A><DD><A HREF="ch03/104-125.html#Heading9">The CIPHER5.CPP Program</A></DL><DD><A HREF="ch03/125-128.html#Heading10">Deciphering Operations</A><DL><DD><A HREF="ch03/125-128.html#Heading11">The Decipherment Process</A><DD><A HREF="ch03/125-128.html#Heading12">The DCIPHER5.BAS Program</A><DD><A HREF="ch03/131-134.html#Heading13">The DCIPHER5.CPP Program</A></DL><DD><A HREF="ch03/131-134.html#Heading14">Alternative Relationships</A><DD><A HREF="ch03/134-136.html#Heading15">Weaknesses</A></DL></DL></B></FONT><BR><DD><A HREF="ch04/137-141.html#Heading1"><FONT SIZE="4"><B>Chapter 4&#151;Transposition-based Monoalphabetic Substitution</B></FONT></A><FONT SIZE="3"><B><DL><DD><A HREF="ch04/137-141.html#Heading2">Matrix-Based Transposition</A><DL><DD><A HREF="ch04/137-141.html#Heading3">Simple Transposition</A><DL><DD><A HREF="ch04/137-141.html#Heading4">Encipherment</A><DD><A HREF="ch04/141-145.html#Heading5">Decipherment</A></DL><DD><A HREF="ch04/141-145.html#Heading6">Numeric Transposition</A><DL><DD><A HREF="ch04/141-145.html#Heading7">Encipherment and Decipherment</A><DD><A HREF="ch04/141-145.html#Heading8">Other Variations</A></DL><DD><A HREF="ch04/141-145.html#Heading9">Interval Extraction</A><DL><DD><A HREF="ch04/141-145.html#Heading10">Encipherment and Decipherment</A></DL></DL><DD><A HREF="ch04/141-145.html#Heading11">Automating Matrix-Based Systems</A><DL><DD><A HREF="ch04/141-145.html#Heading12">Encipherment</A><DL><DD><A HREF="ch04/145-148.html#Heading13">The TRANSPORT Subroutine</A><DD><A HREF="ch04/148-152.html#Heading14">The CIPHERTR.BAS Program</A><DD><A HREF="ch04/148-152.html#Heading15">The INTERVAL Subroutine</A><DD><A HREF="ch04/152-161.html#Heading16">The TRANSPORT.CPP Program</A><DD><A HREF="ch04/161-183.html#Heading17">The CIPHERTR.CPP Program</A><DD><A HREF="ch04/184-187.html#Heading18">The CIPHER6.BAS Program</A><DD><A HREF="ch04/187-211.html#Heading19">The CIPHER6.CPP Program</A></DL><DD><A HREF="ch04/211-215.html#Heading20">Decipherment</A><DL><DD><A HREF="ch04/211-215.html#Heading21">The DCIPHER6.BAS Program</A><DD><A HREF="ch04/215-217.html#Heading22">The DCIPHER6.CPP Program</A></DL></DL><DD><A HREF="ch04/215-217.html#Heading23">Monoalphabetic Combinations</A></DL></B></FONT><BR><DD><A HREF="ch05/221-224.html#Heading1"><FONT SIZE="4"><B>Chapter 5&#151;Polyalphabetic Substitution</B></FONT></A><FONT SIZE="3"><B><DL><DD><A HREF="ch05/221-224.html#Heading2">Simple Polyalphabetic Substitution Systems</A><DL><DD><A HREF="ch05/221-224.html#Heading3">The Vigen&#233;re Cipher</A><DD><A HREF="ch05/224-288.html#Heading4">The POLY1.BAS Program</A><DD><A HREF="ch05/224-288.html#Heading5">The POLY1.CPP Program</A><DD><A HREF="ch05/228-232.html#Heading6">Encipherment</A></DL><DD><A HREF="ch05/228-232.html#Heading7">Other Polyalphabetic Substitution Methods</A><DL><DD><A HREF="ch05/228-232.html#Heading8">Periodic Polyalphabetic Substitution</A><DL><DD><A HREF="ch05/228-232.html#Heading9">Operation</A><DD><A HREF="ch05/232-236.html#Heading10">Reducing Probability of Decipherment</A></DL><DD><A HREF="ch05/232-236.html#Heading11">The POLY2.BAS Program</A><DL><DD><A HREF="ch05/236-240.html#Heading12">The PFORMCIPHER Subroutine</A><DD><A HREF="ch05/236-240.html#Heading13">The PCONVERTSTORE Subroutine</A><DD><A HREF="ch05/236-240.html#Heading14">Program Execution</A></DL><DD><A HREF="ch05/240-245.html#Heading15">The COUNT.CPP Program</A><DD><A HREF="ch05/246-262.html#Heading16">The POLY2.CPP Program</A><DD><A HREF="ch05/262-266.html#Heading17">The DPOLY2.BAS Program</A><DL><DD><A HREF="ch05/262-266.html#Heading18">The DMSGFILE Subroutine</A><DD><A HREF="ch05/262-266.html#Heading19">The DPCONVERTSTORE Subroutine</A><DD><A HREF="ch05/262-266.html#Heading20">Program Execution</A></DL><DD><A HREF="ch05/266-272.html#Heading21">The DPOLY2.CPP Program</A></DL></DL></B></FONT><BR><DD><A HREF="ch06/273-276.html#Heading1"><FONT SIZE="4"><B>Chapter 6&#151;Using Random Numbers</B></FONT></A><FONT SIZE="3"><B><DL><DD><A HREF="ch06/273-276.html#Heading2">Random Numbers and Random Number Sequences</A><DL><DD><A HREF="ch06/273-276.html#Heading3">Generating Random Number Sequences</A><DD><A HREF="ch06/276-278.html#Heading4">Pseudo-random Number Sequences</A><DL><DD><A HREF="ch06/276-278.html#Heading5">The RND Function</A><DD><A HREF="ch06/278-280.html#Heading6">RANDOMIZE Statement</A></DL><DD><A HREF="ch06/278-280.html#Heading7">Working with Random Numbers</A><DL><DD><A HREF="ch06/278-280.html#Heading8">The RANDOM1.BAS Program</A><DD><A HREF="ch06/280-283.html#Heading9">The RANDOM2.BAS Program</A><DD><A HREF="ch06/280-283.html#Heading10">The RANDOM1.CPP Program</A><DD><A HREF="ch06/283-286.html#Heading11">The RANDOM2.CPP Program</A></DL><DD><A HREF="ch06/291-294.html#Heading12">Modulo 26 Arithmetic</A><DL><DD><A HREF="ch06/291-294.html#Heading13">The DRANDOM2.BAS Program</A><DD><A HREF="ch06/294-300.html#Heading14">The DRANDOM2.CPP Program</A></DL></DL><DD><A HREF="ch06/300-303.html#Heading15">Constructing an Enciphering Program</A><DL><DD><A HREF="ch06/300-303.html#Heading16">Extending the Random Process</A><DD><A HREF="ch06/303-306.html#Heading17">Extending the Combinations</A><DD><A HREF="ch06/303-306.html#Heading18">Creating Your Own Random Number Generator</A><DD><A HREF="ch06/306-309.html#Heading19">Program Development</A><DL><DD><A HREF="ch06/312-317.html#Heading20">The POSITION.BAS Program</A><DD><A HREF="ch06/312-317.html#Heading21">The POSITION.CPP Program</A><DD><A HREF="ch06/317-319.html#Heading22">The RTEST.BAS Program</A><DD><A HREF="ch06/317-319.html#Heading23">The RANDOM3.BAS Program</A><DD><A HREF="ch06/317-319.html#Heading24">The RCONVERTSTORE Subroutine</A><DD><A HREF="ch06/319-331.html#Heading25">The RANDOM3.CPP Program</A><DD><A HREF="ch06/331-335.html#Heading26">The DRANDOM3.BAS Program</A><DD><A HREF="ch06/331-335.html#Heading27">The RDCONVERTSTORE Subroutine</A><DD><A HREF="ch06/335-345.html#Heading28">The DRANDOM3.CPP Program</A></DL><DD><A HREF="ch06/345-349.html#Heading29">An Alternative Random Process</A><DL><DD><A HREF="ch06/345-349.html#Heading30">The ROTOR.BAS Program</A></DL></DL></DL></B></FONT><BR><DD><A HREF="ch07/353-355.html#Heading1"><FONT SIZE="4"><B>Chapter 7&#151;Developing Practical Programs</B></FONT></A><FONT SIZE="3"><B><DL><DD><A HREF="ch07/353-355.html#Heading2">Module Utilization</A><DL><DD><A HREF="ch07/355-358.html#Heading3">The ENCIPHER.EXE Program</A><DD><A HREF="ch07/364-368.html#Heading4">The DECIPHER.EXE Program</A><DD><A HREF="ch07/364-368.html#Heading5">The Challenge</A></DL></DL></B></FONT><BR><DD><A HREF="ch08/369-373.html#Heading1"><FONT SIZE="4"><B>Chapter 8&#151;Public Key Encryption</B></FONT></A><FONT SIZE="3"><B><DL><DD><A HREF="ch08/369-373.html#Heading2">General Operation</A><DD><A HREF="ch08/369-373.html#Heading3">Authentication Issues</A><DD><A HREF="ch08/369-373.html#Heading4">Public vs. Private Key Encryption</A><DL><DD><A HREF="ch08/373-375.html#Heading5">Advantages and Disadvantages</A></DL><DD><A HREF="ch08/373-375.html#Heading6">Understanding the Mathematics</A><DL><DD><A HREF="ch08/373-375.html#Heading7">Modular Arithmetic</A><DL><DD><A HREF="ch08/375-378.html#Heading8">Modular Addition</A><DD><A HREF="ch08/375-378.html#Heading9">Modular Subtraction</A><DD><A HREF="ch08/378-381.html#Heading10">Modular Multiplication</A><DD><A HREF="ch08/378-381.html#Heading11">Finding the Multiplicative Inverse</A></DL><DD><A HREF="ch08/378-381.html#Heading12">Prime Numbers</A><DD><A HREF="ch08/382-385.html#Heading13">The Euclidean Algorithm</A><DD><A HREF="ch08/382-385.html#Heading14">The Totient Function</A></DL><DD><A HREF="ch08/385-387.html#Heading15">RSA</A><DL><DD><A HREF="ch08/385-387.html#Heading16">Public Key Generation</A><DD><A HREF="ch08/385-387.html#Heading17">Private Key Generation</A><DD><A HREF="ch08/385-387.html#Heading18">Message Encipherment</A><DD><A HREF="ch08/387-391.html#Heading19">Exponentiation Operations</A><DD><A HREF="ch08/391-392.html#Heading20">Facilitating the Key Generation Process</A><DD><A HREF="ch08/391-392.html#Heading21">Locating Large Primes</A></DL><DD><A HREF="ch08/391-392.html#Heading22">Summary</A></DL></DL></DL><B></FONT><FONT SIZE="4"><B><DD><A HREF="appendix-a.html">Appendix A</A><DD><A HREF="book-index.html">Index</A></B></FONT></DL></body></html>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -