
241 files in total in this section.
Reciprocal Table Auto Solver III.zip by Chuck Mire (Rate this file/View comments) 
The Reciprocal Vigenère Polyalphabetical Square Table was a paper and pencil method of substitution encryption before computers. Words ran together without spacing or other formatting options. Two methods of encryption were used: The AutoKey method where the entire message itself was the encryption key after it was initialized with a single character; and the KeyWord/KeyPhrase method where the key was placed over the message, repeated if necessary, and encrypted letterbyletter. I have expanded on this basic design with the ability to encrypt a large body of formatted text, such as an HTML file, with all the typewriter keys allowed including tabs, carriage returns, line feeds and spaces. Previously, my design was only for the AutoKey method, such as my ASCII_Typewriter_Keys_Reciprocal_Table_AutoKey_Solver.exe program previously uploaded in the QB64 Tab at the home page of QB45.org. With this upload, I now have the ability for the KeyWord/KeyPhrase method. A repeating KeyWord or short KeyPhrase is NOT desirable or necessary because a large set of random typewriter characters can be generated that is the exact length of the formatted message to be encrypted/decrypted with the included RND_Typing_Keys_To_Clipboard.exe program. Furthermore, the random typewriter characters are generated with an identifying number which means that any set can be generated any time by using the exact identifying number and length. With different random typewriter character sets used for different encrypted formatted files, no clues are given for any analysis by unauthorized parties. 
Source included  QB64  959.36 KB  81 downloads
 Rating: 0/10 (0 votes)

Reciprocal VigenĂ¨re Square Table Suite II.zip by Chuck Mire (Rate this file/View comments) 
This zip file contains three [3] Windows executables, with source code, three [3] PDFs and two [2] text files. This suite of programs makes two [2] major changes of my Original Version of Reciprocal Vigenère Square Table Suite, located here: https://qb45.org/files.php?action=showfile&id=1985 The first major change is that it is no longer necessary to manually type in the desired table linear string in any of the executables. Now, different table linear strings can be stored in a text file and edited to ensure accuracy. The string of choice may then be copied, and pasted into any of the executables. Example_Table_Linear_Strings.txt illustrates this and the resulting tables can be viewed in Extended_Reciprocal_Tables_Examples_II.pdf that were made with the Reciprocal_Table_Generator_II.exe. Remember to use the Consolas TrueType Font when printing a table. The second major change is that each cell in a table NOW contains three [3] characters. At the intersection of a row and column, in any cell, the left first two letters/numbers/characters indicate the row & column of that cell  in that order. The right side lower case letter/number/character in any cell is the UPPER CASE letter/number/character chosen to encrypt or decrypt. For example, if the cell shows GOq, it means Row G, Column O, and encrypt or decrypt with Q. Having all this information in each cell minimizes choosing the wrong cell. The Reciprocal_Table_Solver_II.exe is made to encrypt/decrypt a message onestepatatime. The Reciprocal_Table_AutoKey_Solver_II.exe is made to encrypt/decrypt a message allatonce, using the AutoKey method. The Extended_Reciprocal_Tables_II.pdf has two tables formatted in 17" X 11" Landscape Tabloid size if you want to have a commercial service print and optionally laminate either of them. This is for those who want to do paper and pencil encryption/decryption as was done before computers. 
Source included  QB64  1.52 MB  123 downloads
 Rating: 0/10 (0 votes)

Reciprocal VigenĂ¨re Square Table Suite.zip by Chuck Mire (Rate this file/View comments) 
This zipped suite of Windows programs consists of three executables with source code and 3 PDFs. A user can create and print any type of modified Vigenère Polygraphic Square Table by entering a sequential string of UPPPERCASE letters/numbers/characters in the Reciprocal Table Generator.exe [with the Consolas TrueType Font]. The user can encrypt/decrypt a message using any of the tables [onestepatatime] with the Reciprocal Table Solver.exe instead of only using paper and pencil. The user can encrypt/decrypt a message using any of the tables [injustonestep] using the Reciprocal Table AutoKey Solver.exe, but ONLY IF the encryption/decryption is using the AutoKey method. The Reciprocal Table AutoKey Solver.pdf explains in detail how to use the AutoKey method in which a single initializing character starts the encryption/decryption process and then the password is the length of the message and comes from the message itself. The Reciprocal Tables.pdf are 3 different examples of tables created with the Reciprocal Table Generator.exe. The Reciprocal Table Worksheets.pdf are used as paper and pencil aids for encryption/decryption. 
Source included  QB64  1.4 MB  121 downloads
 Rating: 0/10 (0 votes)

Reverse Collatz Conjecture Calculator.zip by Chuck Mire (Rate this file/View comments) 
With my previous program, Collatz Conjecture.exe, (https://qb45.org/files.php?action=showfile&id=1976), using certain rules showed that with any positive integer, a meandering path of integers would always end up at "1". Now with this program, Reverse Collatz Conjecture.exe, instead of ending up "downstream" at "1", by using different rules it is possible to travel through various junctions where different forks can be chosen by the user which results in different meandering integer paths "upstream" with the same starting integer. If the final "upstream" integer is plugged into Collatz Conjecture.exe, the same meandering path is followed "downstream". The zip file contains the Windows executable, the source code, and a PDF with screen shots that fully explain the new "upstream" rules with examples. 
Source included  QB64  1.27 MB  181 downloads
 Rating: 0/10 (0 votes)

Right Triangle Integer Triples.z by Chuck Mire (Rate this file/View comments) 
Generate multiple sets of Pythagorean Right Triangle Integer Triples, which are infinite in number. The Windows executable program has a "Help" screen which explains the algorithm I used. The zip file contains the source code, the Windows executable and two screen shots. 
Source included  QB64  558.41 KB  860 downloads
 Rating: 0/10 (0 votes)

Rock, Paper & Sissors.zip by Chuck Mire (Rate this file/View comments) 
This is the classic game you learned as a kid. Play against your computer while keeping a running score. Each session is different because the TIMER is used to initialize the random generator for each session. 
Source included  QB64  367.1 KB  325 downloads
 Rating: 0/10 (0 votes)

Russian Multiplication.zip by Chuck Mire (Rate this file/View comments) 
Russian Multiplication  also known as Russian Peasant Multiplication  is a simple method of multiplication that only requires the ability to multiply by two, divide by two, and add. The attached zip file contains the Windows executable, the source code, and a PDF with two explanatory screen shots. 
Source included  QB64  482.67 KB  475 downloads
 Rating: 0/10 (0 votes)

Small Binary Clock.zip by Chuck Mire (Rate this file/View comments) 
A Windows executable binary clock that you can move anywhere on your Windows Desktop. The time displayed is in 24hour format. The binary values of each circle are as follows (from bottom to top): 1, 2, 4, and 8. For each lit circle in a column you add up the appropriate values. Watch how it updates exactly at midnight  really cool. 
Source included  QB64  366.98 KB  1404 downloads
 Rating: 0/10 (0 votes)

SMS Text Crypt.zip by Chuck Mire (Rate this file/View comments) 
SMS Text Crypt.exe is a Windows executable that is designed to encrypt and decrypt short text messages that are copied to – and pasted from – the clipboard. The encryption is done in such a way that the resulting characters are all printable in a text document – no spaces and no control characters: ASCII Characters 33 minimum through Character 126 maximum. To enhance the encryption, multiple encryptions/decryptions can be done all at once as long as the final action is an encryption. The zip file contains the Windows executable, the source code, and a PDF with a complete explanation and multiple screen shots. 
Source included  QB64  800.88 KB  601 downloads
 Rating: 0/10 (0 votes)

String$ to Numbers & Numbers to .zip by Chuck Mire (Rate this file/View comments) 
Convert a string to numbers using CVI & CVL functions. Then convert the numbers back to the string using MKI$ and MKL$ functions. The zip file contains the Windows executable, the source code and a PDF with six illustrative screen shots. 
Source included  QB64  653.47 KB  554 downloads
 Rating: 0/10 (0 votes)

Subtraction Without Borrowing.zip by Chuck Mire (Rate this file/View comments) 
Subtract any two numbers without any borrowing by using the Nine's Complement approach with addition. The attached zip contains the Windows executable, the source code, and a PDF that explains the stepbystep procedure with two screenshots. 
Source included  QB64  693.82 KB  492 downloads
 Rating: 0/10 (0 votes)

Swap Unsigned Number Bases Calcu.zip by Chuck Mire (Rate this file/View comments) 
This Windows executable program will swap between any of the "normal" numberbases (2, 8, 10, and 16) to any other of the "normal" numberbases. It also can swap between any other numberbases as defined and input by the user  for example, base3 to base5, base7 to base19, etc. With this feature, the symbols used can be chosen by the user  numeric and/or alpha characters. The results can be copied to the clipboard and pasted into any text editor such as Notepad. Input for the "normal" numberbases can be pasted from the clipboard and results can then be copied back to the clipboard. One unique numberbase is the complete ASCII set, ASCII(0) through ASCII(255), which can be considered as a base256 number. Type in ASCII text and then convert it into a (long!) Base10 number. Then convert that (long!) Base10 number into any of the "normal" or user defined numberbases with the copy/paste/copy features. Please read the included PDF file for a thorough description of the normal and advanced features of this program. 
Source included  QB64  1.94 MB  1497 downloads
 Rating: 0/10 (0 votes)

Text Converted to Multiple Numbe.zip by Chuck Mire (Rate this file/View comments) 
A continuous line of text can be considered as a Base96 Number Base, from CHR$(32) through CHR$(126) plus CHR$(9), the <Tab> key. This program automatically handles the setup when the user enters a Random Seed  which then computes the pseudorandom Number Base Set (ranging from Base100 through Base223), its Minimum ASCII Offset, its Maximum ASCII Offset, as well as the pseudorandom Text Base96 Set. Each Random Seed will generate a completely different setup. Therefore, without knowing the Random Seed, the converted number in the chosen Number Base cannot be converted back to text. The zip file contains the Windows executable, the source code, a PDF with screen shots, and a text file with text converted to number bases. 
Source included  QB64  758.13 KB  555 downloads
 Rating: 0/10 (0 votes)

Page: 1  2  3  4  5  6  7  8  9

