Introducing the “Welcome to Xojo” Bundle!

New to Xojo and looking for guidance? We've put together a terrific bundle to welcome you! Xojo Bundle

This bundle includes six back issues of the magazine -- all of year 14 in printed book and digital formats -- plus a one-year subscription so you'll be learning all about Xojo for the next year. It's the perfect way to get started programming with Xojo. And you save as much as $35 over the non-bundle price!

This offer is only available for a limited time as supplies are limited, so hurry today and order this special bundle before the offer goes away!

Article Preview

Buy Now




Random Number Encryption

Issue: 5.4 (May/June 2007)
Author: JC Cruz
Article Description: No description available.
Article Length (in bytes): 22,434
Starting Page Number: 21
RBD Number: 5411
Resource File(s):

Download Icon 5411.zip Updated: Saturday, July 28, 2007 at 12:08 AM

Related Web Link(s):


Known Limitations: None

Excerpt of article text...

Today, we will learn how to use a random number generator as the basis of a cipher system. We will also learn more about the LFSR generator, and how to make it non-linear. We will then build a basic Vernam cipher using the modified LFSR generator and REALbasic.

A Brief Primer on Cryptography

The field of cryptography is the study of cipher systems. A cipher system allows the secure exchange of data in the presence of adversaries. In a well-designed system, only the intended receiver will be able to read the secured data.

Figure 1 shows a basic cipher system in action. The sender first enters the original data, or plaintext, into a cipher function. She then enters a second piece of data, the key, into the same function. The cipher function combines the two data streams and outputs the results as the ciphertext. This step is known as encryption.

The sender then sends the ciphertext to the receiver. The receiver feeds the ciphertext into the same cipher function. He also enters a key into the function. The cipher function combines the ciphertext and key, and gives the original plaintext as a result (Figure 2). This step is known as decryption.

...End of Excerpt. Please purchase the magazine to read the full article.

Article copyrighted by REALbasic Developer magazine. All rights reserved.




Weblog Commenting and Trackback by HaloScan.com