Introducing the “Welcome to Xojo” Bundle!

New to Xojo and looking for guidance? We've put together a terrific bundle to welcome you! Xojo Bundle

This bundle includes six back issues of the magazine -- all of year 14 in printed book and digital formats -- plus a one-year subscription so you'll be learning all about Xojo for the next year. It's the perfect way to get started programming with Xojo. And you save as much as $35 over the non-bundle price!

This offer is only available for a limited time as supplies are limited, so hurry today and order this special bundle before the offer goes away!

Article Preview

Buy Now




Vernam Cipher and E-mail

Issue: 5.6 (September/October 2007)
Author: JC Cruz
Article Description: No description available.
Article Length (in bytes): 21,372
Starting Page Number: 23
RBD Number: 5610
Resource File(s):

Download Icon 5610.zip Updated: Friday, September 14, 2007 at 7:41 PM

Related Web Link(s):


Known Limitations: None

Excerpt of article text...

In this article, we will look into the topic of e-mail encryption. First, we will learn the basics of an e-mail system. Then we will learn the security issues that plague such a system. Next, we will develop two custom classes that use the Vernam cipher to encrypt a message. Finally, we will use these classes to send and receive an encrypted message.

A Quick E-mail Primer

Since 1961, e-mail became one of the most common forms of communication. It evolved from a way of exchanging written text to one that delivers pictures, sound, and even software.

Most e-mail systems work as client-server systems (Figure 1). The e-mail client sends a message to the mail server. If the recipient is on the same server as the sender, the server sends a copy of the message to the recipient. Otherwise, the server routes the message to the other servers on the network.

Also, most e-mail systems support at least two basic protocols to handle message exchange. Clients send messages to the server using SMTP. They then retrieve messages from the server using POP3 or IMAP.

...End of Excerpt. Please purchase the magazine to read the full article.

Article copyrighted by REALbasic Developer magazine. All rights reserved.




Weblog Commenting and Trackback by HaloScan.com