Introducing the “Welcome to Xojo” Bundle!

New to Xojo and looking for guidance? We've put together a terrific bundle to welcome you! Xojo Bundle

This bundle includes six back issues of the magazine -- all of year 21 in printed book and digital formats -- plus a one-year subscription (beginning with 22.1) so you'll be learning all about Xojo for the next year. It's the perfect way to get started programming with Xojo. And you save as much as $35 over the non-bundle price!

This offer is only available for a limited time as supplies are limited, so hurry today and order this special bundle before the offer goes away!

Article Preview

Buy Now

Issue 8.5



Encrypting with Vigenère

Issue: 8.5 (July/August 2010)
Author: JC Cruz
Author Bio: JC is a freelance technical writer living in British Columbia. His articles appear in various publications such as MacTech, Python Magazine and REALbasic Developer. He also spends quality time with his dear nephew. He can be reached at: anarakisware@gmail.com
Article Description: No description available.
Article Length (in bytes): 52,436
Starting Page Number: 30
Article Number: 8507
Resource File(s):

Download Icon 8507.zip Updated: 2010-07-05 16:14:43

Related Web Link(s):


Excerpt of article text...

Here we are once more with another installment of REALSecure. In today's article, we will venture into the field of substitution ciphers. We will study the history behind these ciphers and learn one classic algorithm: the Vigenère cipher. Next, we will implement a modern version of this cipher as a REALbasic class. We will also address some of the cipher's inherent faults. Finally, we will use our cipher class to build a simple encryption tool.

The Need for Encryption

In today's heavily networked society, we face the ever-growing challenge of keeping our privacy. This challenge is further compounded by the presence of dedicated data thieves. These persons have the skills, tools and amoral drive to break into our computer accounts and steal our personal data. To deter these attempts and protect our data, we can restrict access to our accounts to a trusted few. We can store only public data in these accounts, but keep our private data offline. And we can scramble our private data with the use of a cipher.

...End of Excerpt. Please purchase the magazine to read the full article.