Special

Introducing the “Welcome to Xojo” Bundle!

New to Xojo and looking for guidance? We've put together a terrific bundle to welcome you! Xojo Bundle

This bundle includes six back issues of the magazine -- all of year 14 in printed book and digital formats -- plus a one-year subscription so you'll be learning all about Xojo for the next year. It's the perfect way to get started programming with Xojo. And you save as much as $35 over the non-bundle price!

This offer is only available for a limited time as supplies are limited, so hurry today and order this special bundle before the offer goes away!

Article Preview


Buy Now

PDF:

Feature

REALSecure

Encrypting with Vigenere

Issue: 8.5 (July/August 2010)
Author: JC Cruz
Article Description: No description available.
Article Length (in bytes): 29,539
Starting Page Number: 30
RBD Number: 8507
Resource File(s):

Download Icon 8507.zip Updated: Monday, July 5, 2010 at 4:47 PM

Related Web Link(s):

http://www.umich.edu/~umich/fm-34-40-2/
place download URL here
http://www.simonsingh.net/The_Black_Chamber/vigenere_cipher.html
http://en.wikipedia.org/wiki/Substitution_cipher
http://en.wikipedia.org/wiki/Kerckhoffs%27_principle
http://en.wikipedia.org/wiki/Polyalphabetic_cipher
http://en.wikipedia.org/wiki/Playfair_cipher
http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher

Known Limitations: None

Excerpt of article text...

Here we are once more with another installment of REALSecure. In today's article, we will venture into the field of substitution ciphers. We will study the history behind these ciphers and learn one classic algorithm: the Vigenere cipher. Next, we will implement a modern version of this cipher as a REALbasic class. We will also address some of the cipher's inherent faults. Finally, we will use our cipher class to build a simple encryption tool.

The Need for Encryption

In today's heavily networked society, we face the ever-growing challenge of keeping our privacy. This challenge is further compounded by the presence of dedicated data thieves. These persons have the skills, tools and amoral drive to break into our computer accounts and steal our personal data. To deter these attempts and protect our data, we can restrict access to our accounts to a trusted few. We can store only public data in these accounts, but keep our private data offline. And we can scramble our private data with the use of a cipher.

...End of Excerpt. Please purchase the magazine to read the full article.

Article copyrighted by REALbasic Developer magazine. All rights reserved.


 


|

 


Weblog Commenting and Trackback by HaloScan.com