⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 book-index.html

📁 这个是密码学的经典著作
💻 HTML
字号:
<html><head><TITLE>Learn Encryption Techniques with BASIC and C++:Index</TITLE>
<!-- BEGIN HEADER --><META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"><SCRIPT><!--function displayWindow(url, width, height) {        var Win = window.open(url,"displayWindow",'width=' + width +',height=' + height + ',resizable=1,scrollbars=yes');}//--></SCRIPT></HEAD><body bgcolor="ffffff" link="#006666" alink="#006666" vlink="#006666"><P>
<CENTER><B>Learn Encryption Techniques with BASIC and C++</B>
<FONT SIZE="-2">
<BR>
<I>(Publisher: Wordware Publishing, Inc.)</I>
<BR>
Author(s): Gil Held
<BR>
ISBN: 1556225989
<BR>
Publication Date: 10/01/98
</FONT></CENTER>
<P>


<!-- Empty Reference Subhead -->

<!--ISBN=1556225989//-->
<!--TITLE=Learn Encryption Techniques with BASIC and C++//-->
<!--AUTHOR=Gilbert Held//-->
<!--PUBLISHER=Wordware Publishing, Inc.//-->
<!--CHAPTER=0//-->
<!--PAGES=397-401//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="ewtoc.html">Table of Contents</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H2><A NAME="Heading1"></A><FONT COLOR="#000077">Index</FONT></H2>
<P><FONT SIZE="+1"><B>A</B></FONT></P>
<DL>
<DD>alphabet,
<DL>
<DD>cipher, 230
<DD>ciphertext, 18, 25
<DD>displacement, 27
<DD>keyword-based mixed, 95
<DD>numeric-based transposition, 142
<DD>plaintext, 18, 25
<DD>reverse ciphertext, 31
</DL>
<DD>alphabetic relationships, 25-27
<DL>
<DD>alternative, 133
<DD>common, 134
</DL>
<DD>alphabetic shift key, 30
<DL>
<DD>combining with keyword-based mixed alphabet, 104
<DD>using, 33
</DL>
<DD>authentication, 370-371
</DL>
<P><FONT SIZE="+1"><B>B</B></FONT></P>
<DL>
<DD>backslash character, (\), 58
<DD>BASIC subroutines, 354-355
<DD>Baudot code, 274-275
<DD>binary random number sequences, 274
</DL>
<P><FONT SIZE="+1"><B>C</B></FONT></P>
<DL>
<DD>C&#43;&#43; language, 19
<DD>Caesar cipher, 16, 24
<DD>challenge message, 366
<DD>checkInput function, 100
<DD>cipher alphabet, 230
<DD>cipher disk, 222
<DD>cipher system, 2-4
<DD>cipher systems,
<DL>
<DD>substitution, 15-17
<DD>transposition, 15, 17-18
<DD>types of, 15-18
</DL>
<DD>cipher,
<DL>
<DD>Caesar, 16, 24
<DD>Playfair, 218-219
<DD>Vigenere, 223-229
</DL>
<DD>ciphers, 2-4
<DD>ciphertext, 6
<DL>
<DD>converting to, 39-47
</DL>
<DD>ciphertext alphabet, 18, 25
<DD>cleartext, see plaintext
<DD>code positions, 307
<DD>code system, 2-4
<DD>codes, 2-4
<DD>CONVERTSTORE subroutine, 58-60, 354
<DD>createAlphabet function, 100
<DD>createCipher function, 42, 94
<DD>cryptology, 1-2
</DL>
<P><FONT SIZE="+1"><B>D</B></FONT></P>
<DL>
<DD>DCONVERTSTORE subroutine, 129-130, 354
<DD>decipher function, 94
<DD>DECIPHER subroutine, 84, 354
<DD>DECIPHER.EXE execution, 364-366
<DD>decipherment, 3, 6-8, 32-33
<DL>
<DD>reducing probability of, 232-233
</DL>
<DD>decipherment process, 6-8
<DD>decoding, 3
<DD>decrypt function, 335
<DD>decryptFile function, 335
<DD>decryptKeyboardText function, 335
<DD>Diffie-Hellman concept, 372-373
<DD>digital signature, 370
<DD>displacement, 26-27, 31
<DD>displacement alphabet, 27
<DD>DMSGFILE subroutine, 82-84, 128-129, 264, 354
<DD>DO UNTIL loop, 59
<DD>DPCONVERTSTORE subroutine, 264-265
<DD>DPRTOUT subroutine, 85, 354
</DL>
<P><FONT SIZE="+1"><B>E</B></FONT></P>
<DL>
<DD>electronic mail systems, 18-19
<DD>ENCIPHER subroutine, 282
<DD>ENCIPHER.EXE execution, 362-364
<DD>encipherment, 3, 5, 31-32
<DL>
<DD>RSA, 386-387
</DL>
<DD>encipherment process, 5-6
<DD>encoding, 3
<DD>encryptFile function, 322
<DD>encryption systems,
<DL>
<DD>private key based, 10-12
<DD>public key based, 10-12
<DD>types of, 10
</DL>
<DD>encryptKeyboardText function, 322
<DD>errors, limiting, 47
<DD>Euclidean algorithm, 382-384
<DD>exponentiation, 387-390
</DL>
<P><FONT SIZE="+1"><B>F</B></FONT></P>
<DL>
<DD>Fermat&#146;s theorem, 391
<DD>formatData function, 94
<DD>FORMCIPHER subroutine, 34, 354
<DD>formCipheredMessage function, 42
<DD>FOR-NEXT statement, 35, 41
<DD>frequency analysis, 136, 217, 221
</DL>
<P><FONT SIZE="+1"><B>G</B></FONT></P>
<DL>
<DD>getFileToDecipher function, 94
<DD>getKeyword function, 100
<DD>getMessage function, 42
<DD>getShiftKey function, 42, 94
<DD>GOSUB statement, 67
<DD>greatest common divisor, 382
<DD>GROUPBY5 subroutine, 47-48, 354
<DL>
<DD>modified, 63-64
</DL>
</DL>
<P><FONT SIZE="+1"><B>I</B></FONT></P>
<DL>
<DD>INITIALIZE subroutine, 33, 96, 354
<DL>
<DD>modified, 105, 356-358
</DL>
<DD>INPUT statement, 34
<DD>INT function, 279
<DD>interval extraction, 143-144
<DD>interval function, 187
<DD>INTERVAL subroutine, 151-152, 354
</DL>
<P><FONT SIZE="+1"><B>K</B></FONT></P>
<DL>
<DD>Kerckhoffs method, 234
<DD>key, 4, 8-10
<DL>
<DD>distribution, 11, 13-14
<DD>generation, 11, 13, 391
<DD>management, 12-14
</DL>
<DD>key space, 8-10
<DD>keyword phrase, 96
<DD>KEYWORD subroutine, 96, 98-99, 354, 358-359
<DD>keyword-based mixed alphabet, 95
<DL>
<DD>combining with alphabetic shift key, 104
<DD>constructing, 95-96
</DL>
<DD>keyword-based monoalphabetic substitution,
<DL>
<DD>deciphering process, 125-133
<DD>enciphering process, 106-125
<DD>weaknesses of, 135-136
</DL>
</DL>
<P><FONT SIZE="+1"><B>L</B></FONT></P>
<DL>
<DD>LEN statement, 40
<DD>LTRIM$ statement, 58
</DL>
<P><FONT SIZE="+1"><B>M</B></FONT></P>
<DL>
<DD>MAGIC, 17
<DD>Manhattan Project, 143
<DD>matrix-based systems,
<DL>
<DD>automating, 144-216
<DD>decipherment of, 211-216
<DD>encipherment of, 144-211
</DL>
<DD>matrix-based transposition, 137-144
<DD>mnemonic key, 98
<DD>modular addition, 375-377
<DD>modular arithmetic, 375-380
<DL>
<DD>finding multiplicative inverse in, 380
</DL>
<DD>modular multiplication, 378-380
<DD>modular subtraction, 378
<DD>modulo arithmetic, 6-8
<DD>modulo 9 arithmetic, 376
<DD>modulo 26 arithmetic, 291
<DL>
<DD>encipherment/decipherment, 291-292
</DL>
<DD>monoalphabetic substitution, 23
<DL>
<DD>transposition-based, 137-144
</DL>
<DD>monoalphabetic unilateral substitution, 23
<DD>MSGDCIPHER subroutine, 354
<DD>MSGENCIPHER subroutine, 40-41, 354
<DD>MSGFILE subroutine, 57-58, 354
<DD>multiple-line messages, processing, 56-57
<DD>multiplicative inverses, 380
</DL>
<P><FONT SIZE="+1"><B>N</B></FONT></P>
<DL>
<DD>numeric transposition, 141-143
<DD>numeric-based transposition alphabet, 142
<DD>numericExtraction function, 187
</DL>
<P><FONT SIZE="+1"><B>O</B></FONT></P>
<DL>
<DD>Oite, 48
<DD>one-time pad, 277-278
</DL>
<P><FONT SIZE="+1"><B>P</B></FONT></P>
<DL>
<DD>PA-K2, 48
<DD>PCONVERTSTORE subroutine, 237-238
<DD>periodic polyalphabetic substitution, 230-233
<DD>PFORMCIPHER subroutine, 236-237
<DL>
<DD>modified, 360
</DL>
<DD>plaintext, 3, 5
<DD>plaintext alphabet, 18, 25
<DD>Playfair cipher, 218-219
<DD>pocket cipher, 229
<DD>polyalphabetic substitution systems, 221-234
<DL>
<DD>periodic, 230-233
<DD>simple, 223-229
<DD>weaknesses of, 234
</DL>
<DD>prime numbers, 381
<DL>
<DD>large, 391-392
<DD>locating, 391-392
<DD>Mersenne primes, 381
<DD>Sophie Germain primes, 381
<DD>twin primes, 381
</DL>
<DD>PRINTIT subroutine, 224
<DD>printResults function, 42
<DD>private key based encryption, 10-12
<DD>private key encryption, 371
<DD>private key generation, RSA, 386
<DD>probability of decipherment, reducing, 232-233
<DD>probable word attack, 229
<DD>program listings
<DL>
<DD>ASCII.CPP, 309-310
<DD>CIPHER1.BAS, 33-34
<DD>CIPHER1.CPP, 35-39
<DD>CIPHER2.BAS, 39-40
<DD>CIPHER2.CPP, 42-47
<DD>CIPHER3.BAS, 49-50
<DD>CIPHER3.CPP, 51-56
<DD>CIPHER4.BAS, 64-67
<DD>CIPHER4.CPP, 70-81
<DD>CIPHER5.BAS (main portion), 105
<DD>CIPHER5.CPP, 109-125
<DD>CIPHER6.BAS, 184-185
<DD>CIPHER6.CPP, 187-211
<DD>CIPHERTR.BAS (main portion), 148-149
<DD>CIPHERTR.CPP, 161-183
<DD>combining random number sequence and three-numeric key, 304
<DD>COUNT.CPP, 240-245
<DD>DCIPHER4.BAS (main portion), 86
<DD>DCIPHER4.CPP, 88-94
<DD>DCIPHER5.BAS (main portion), 127-128
<DD>DCIPHER5.CPP, 132-133
<DD>DCIPHER6.BAS (main portion), 212
<DD>DCIPHER6.CPP (decipher function),215-216
<DD>DPOLY2.BAS (main portion), 263
<DD>DPOLY2.CPP, 267-269
<DD>DPOLY2.CPP (decipher and getFileToDecipher functions), 269-271
<DD>DRANDOM2.BAS, 292-293
<DD>DRANDOM2.CPP, 295-299
<DD>DRANDOM3.BAS (main portion), 332
<DD>DRANDOM3.CPP, 336-345
<DD>ENCIPHER.BAS (main portion), 356
<DD>POLY1.BAS, 224-225
<DD>POLY1.CPP, 226-228
<DD>POLY2.BAS (main portion), 235-236
<DD>POLY2.CPP, 246-262
<DD>POSITION.BAS, 313
<DD>POSITION.CPP, 314-317
<DD>random number generator, 301-302
<DD>RANDOM1.BAS, 280
<DD>RANDOM1.CPP, 283-285
<DD>RANDOM2.BAS, 281
<DD>RANDOM2.CPP, 286-291
<DD>RANDOM3.BAS (statements in main portion), 319
<DD>RANDOM3.CPP, 322-331
<DD>ROTOR.BAS, 347-348
<DD>RTEST.BAS, 318
<DD>SHIFT.BAS, 28
<DD>SHIFT.CPP, 29-30
<DD>TRANSPORT.CPP, 153-161
<DD>using ASCII character values, 308
<DD>WORD.BAS, 96-97
<DD>WORD.CPP, 100-103
</DL>
<DD>PRTOUT subroutine, 35, 60-63, 354
<DD>pseudo-random number generator, creating, 305-306
<DD>pseudo-random number sequences, 273, 276
<DL>
<DD>generating, 276-279
</DL>
<DD>pseudo-random sequence, 16
<DD>public key based encryption, 10-12
<DD>public key encryption, 369-370
<DL>
<DD>advantages, 373
<DD>disadvantages, 373-374
<DD>general operation of, 369-370
</DL>
<DD>public key generation, RSA, 386
<DD>PURPLE, 17
</DL>
<P><FONT SIZE="+1"><B>Q</B></FONT></P>
<DL>
<DD>QuickBASIC language, 19
</DL>
<P><FONT SIZE="+1"><B>R</B></FONT></P>
<DL>
<DD>random number generation, 277-279
<DL>
<DD>alternative process for, 345-351
</DL>
<DD>random number generator, creating, 305
<DD>random number sequences, 273
<DL>
<DD>generating, 275
</DL>
<DD>random numbers, 273
<DL>
<DD>extending security of, 301, 303
</DL>
<DD>RANDOMIZE SEED1 statement, 349
<DD>RANDOMIZE SEED2 statement, 349
<DD>RANDOMIZE statement, 278-279
<DD>RCONVERTSTORE subroutine, 319-321, 354
<DL>
<DD>modified, 360-361
</DL>
<DD>RDCONVERTSTORE subroutine, 332-333, 355
<DD>REM statement, 98
<DD>repetition period, 231
<DD>RESTORE statement, 106
<DD>reverse ciphertext alphabet, 31
<DD>RND function, 276-277
<DD>ROTOR subroutine, 350
<DD>RSA, 385-387
</DL>
<P><FONT SIZE="+1"><B>S</B></FONT></P>
<DL>
<DD>SETUP subroutine, 354, 361-362
<DD>simple transposition, 140-141
<DD>six-position code, 310-312
<DD>slash character (/), 58
<DD>subroutines,
<DL>
<DD>CONVERTSTORE, 58-60, 354
<DD>DCONVERTSTORE, 129-130, 354
<DD>DECIPHER, 84, 354
<DD>DMSGFILE, 82-84, 128-129, 264, 354
<DD>DPRTOUT, 85, 354
<DD>ENCIPHER, 282
<DD>FORMCIPHER, 34-35, 354
<DD>GROUPBY5, 47-48, 354
<DD>GROUPBY5, modified, 63-64
<DD>INITIALIZE, 33, 96, 354
<DD>INITIALIZE, modified, 105, 356-358
<DD>INTERVAL, 151-152, 354
<DD>KEYWORD, 96, 98-99, 354, 358-359
<DD>MSGDCIPHER, 354
<DD>MSGENCIPHER, 40-41, 354
<DD>MSGFILE, 57-58, 354
<DD>PCONVERTSTORE, 237-238
<DD>PFORMCIPHER, 236-237
<DD>PFORMCIPHER, modified, 360
<DD>PRINTIT, 224
<DD>PRTOUT, 35, 60-63, 354
<DD>RCONVERTSTORE, 319-321, 354
<DD>RCONVERTSTORE, modified, 360-361
<DD>RDCONVERTSTORE, 332-333, 355
<DD>ROTOR, 350
<DD>SETUP, 354, 361-362
<DD>SPCONVERTSTORE, 264-265
<DD>TABLE, 224
<DD>TRANSPORT, 145-148, 354
</DL>
<DD>substitution cipher systems, 15-17
<DD>symmetric key system, see private key based encryption
</DL>
<P><FONT SIZE="+1"><B>T</B></FONT></P>
<DL>
<DD>TABLE subroutine, 224
<DD>totient function, 384-385
<DD>TRANSPORT subroutine, 145-148, 354
<DD>transposition,
<DL>
<DD>matrix-based, 137-144
<DD>simple, 140-141
</DL>
<DD>transposition cipher systems, 15, 17-18
<DD>transposition-based monoalphabetic substitution, 137-144
</DL>
<P><FONT SIZE="+1"><B>U</B></FONT></P>
<DL>
<DD>unilateral substitution, 23-24
<DD>UUDECODE, 18
<DD>UUENCODE, 18
</DL>
<P><FONT SIZE="+1"><B>V</B></FONT></P>
<DL>
<DD>Vigen&#233;re cipher system, 223-229
<DL>
<DD>basic tableau, 223-224
<DD>encipherment, 228-229
</DL>
</DL>
<P><FONT SIZE="+1"><B>W</B></FONT></P>
<DL>
<DD>WHILE-WEND loop, 62
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="ewtoc.html">Table of Contents</A></TD>
</TR>
</TABLE>
</CENTER>


</body></html>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -