|
342 files in total in this section.
Random File Maker.zip by Chuck Mire (Rate this file/View comments) |
Random File Maker.exe is a Windows executable that will make a Pseudo-Random ASCII Characters file with the ability to: (1) Define the size, (2) Define the range of ASCII Characters & (3) Define a Pseudo-Random Key and Sub-Key in order to reconstruct the file over again. It would be useful, for example, to use the output of this program with another program made to XOR the output with an unencrypted file and then save the results into a third encrypted file. Reversing the process would restore the unencrypted file: Unencrypted file---> XOR Program---> Random file (SAME length as the Unencrypted file)---> Encrypted File. Encrypted file---> XOR Program---> Random file (SAME as before)---> Unencrypted file. The attached Zip file contains the source code, the Windows executable and a PDF with 10 screenshots that show/explain all the features. |
Source included - QB64 - 714.7 KB - 883 downloads
| Rating: 0/10 (0 votes)
|
Random File Maker.zip by Chuck Mire (Rate this file/View comments) |
In addition to the ability to choose any continuous range of characters, this version, Random File Maker II, now has the ability to choose a discontinuous range of characters consisting of: Numbers & Alpha (numbers 0 through 9 along with the UPPER and lower case alphabets only); DNA characters (GCAT); Hexidecimal (0123456789ABCDEF); and Roman Numerals (IVXLCDM) Otherwise, it is the same standard approach as the original version with the ability to control all of the parameters which allows for the exact duplication of the file at a later time should the need arise. |
Source included - QB64 - 381.78 KB - 731 downloads
| Rating: 0/10 (0 votes)
|
Reciprocal One-Time Pad Table Generator & Solver.zip by Chuck Mire (Rate this file/View comments) |
These two programs represent a trip back in memory lane when one-time pads were generated on paper and secretly distributed to the parties concerned. If a pad was leaked to someone outside of those parties, or if a pad was used more than once, or if a pad was shorter than the message, or if a pad was not truly random, then the transmission might no longer be secret. The attached zip file contains both Windows executables, the source codes and a PDF with screen shots and detailed instructions. |
Source included - QB64 - 1.09 MB - 527 downloads
| Rating: 0/10 (0 votes)
|
Reciprocal Table Auto Solver II.zip by Chuck Mire (Rate this file/View comments) |
My last upload, Reciprocal_Vigenère_Square_Table_Suite_II [Available here, https://qb45.org/files.php?action=showfile&id=1986], was designed to completely solve a Vigenère Square Table using the Auto-Key algorithm. This upload, Reciprocal_Table_Auto_Solver_II, is instead designed to completely solve a Vigenère Square Table by the more traditional method of choosing, letter-by-letter, each character in the message with the ROW; and each character in the Repeating Key-Word or Extended-Key-Phrase with the COLUMN; in order to choose the character to encrypt or decrypt at the cross-indexed ROW & COLUMN location. Everything is explained in detail in the attached zip file, which contains the Windows executable, the source code, a Read_Me PDF, a Miscellaneous_Notes PDF, a Screenshots_PDF and a Legal_Page_Reciprocal_Table_PDF [which is an 11" X 14" Landscape Legal Page printable example of my highly modified and expanded form of a Vigenère Square Table]. |
Source included - QB64 - 770.9 KB - 309 downloads
| Rating: 0/10 (0 votes)
|
Reciprocal Table Auto Solver III.zip by Chuck Mire (Rate this file/View comments) |
The Reciprocal Vigenère Polyalphabetical Square Table was a paper and pencil method of substitution encryption before computers. Words ran together without spacing or other formatting options. Two methods of encryption were used: The Auto-Key method where the entire message itself was the encryption key after it was initialized with a single character; and the Key-Word/Key-Phrase method where the key was placed over the message, repeated if necessary, and encrypted letter-by-letter. I have expanded on this basic design with the ability to encrypt a large body of formatted text, such as an HTML file, with all the typewriter keys allowed including tabs, carriage returns, line feeds and spaces. Previously, my design was only for the Auto-Key method, such as my ASCII_Typewriter_Keys_Reciprocal_Table_Auto-Key_Solver.exe program previously uploaded in the QB64 Tab at the home page of QB45.org. With this upload, I now have the ability for the Key-Word/Key-Phrase method. A repeating Key-Word or short Key-Phrase is NOT desirable or necessary because a large set of random typewriter characters can be generated that is the exact length of the formatted message to be encrypted/decrypted with the included RND_Typing_Keys_To_Clipboard.exe program. Furthermore, the random typewriter characters are generated with an identifying number which means that any set can be generated any time by using the exact identifying number and length. With different random typewriter character sets used for different encrypted formatted files, no clues are given for any analysis by unauthorized parties. |
Source included - QB64 - 959.36 KB - 277 downloads
| Rating: 0/10 (0 votes)
|
Reciprocal Vigenère Square Table Suite II.zip by Chuck Mire (Rate this file/View comments) |
This zip file contains three [3] Windows executables, with source code, three [3] PDFs and two [2] text files. This suite of programs makes two [2] major changes of my Original Version of Reciprocal Vigenère Square Table Suite, located here: https://qb45.org/files.php?action=showfile&id=1985 The first major change is that it is no longer necessary to manually type in the desired table linear string in any of the executables. Now, different table linear strings can be stored in a text file and edited to ensure accuracy. The string of choice may then be copied, and pasted into any of the executables. Example_Table_Linear_Strings.txt illustrates this and the resulting tables can be viewed in Extended_Reciprocal_Tables_Examples_II.pdf that were made with the Reciprocal_Table_Generator_II.exe. Remember to use the Consolas TrueType Font when printing a table. The second major change is that each cell in a table NOW contains three [3] characters. At the intersection of a row and column, in any cell, the left first two letters/numbers/characters indicate the row & column of that cell - in that order. The right side lower case letter/number/character in any cell is the UPPER CASE letter/number/character chosen to encrypt or decrypt. For example, if the cell shows GOq, it means Row G, Column O, and encrypt or decrypt with Q. Having all this information in each cell minimizes choosing the wrong cell. The Reciprocal_Table_Solver_II.exe is made to encrypt/decrypt a message one-step-at-a-time. The Reciprocal_Table_Auto-Key_Solver_II.exe is made to encrypt/decrypt a message all-at-once, using the Auto-Key method. The Extended_Reciprocal_Tables_II.pdf has two tables formatted in 17" X 11" Landscape Tabloid size if you want to have a commercial service print and optionally laminate either of them. This is for those who want to do paper and pencil encryption/decryption as was done before computers. |
Source included - QB64 - 1.52 MB - 332 downloads
| Rating: 0/10 (0 votes)
|
Reciprocal Vigenère Square Table Suite.zip by Chuck Mire (Rate this file/View comments) |
This zipped suite of Windows programs consists of three executables with source code and 3 PDFs. A user can create and print any type of modified Vigenère Polygraphic Square Table by entering a sequential string of UPPPERCASE letters/numbers/characters in the Reciprocal Table Generator.exe [with the Consolas TrueType Font]. The user can encrypt/decrypt a message using any of the tables [one-step-at-a-time] with the Reciprocal Table Solver.exe instead of only using paper and pencil. The user can encrypt/decrypt a message using any of the tables [in-just-one-step] using the Reciprocal Table Auto-Key Solver.exe, but ONLY IF the encryption/decryption is using the Auto-Key method. The Reciprocal Table Auto-Key Solver.pdf explains in detail how to use the Auto-Key method in which a single initializing character starts the encryption/decryption process and then the password is the length of the message and comes from the message itself. The Reciprocal Tables.pdf are 3 different examples of tables created with the Reciprocal Table Generator.exe. The Reciprocal Table Worksheets.pdf are used as paper and pencil aids for encryption/decryption. |
Source included - QB64 - 1.4 MB - 343 downloads
| Rating: 0/10 (0 votes)
|
Reverse Collatz Conjecture Calculator.zip by Chuck Mire (Rate this file/View comments) |
With my previous program, Collatz Conjecture.exe, (https://qb45.org/files.php?action=showfile&id=1976), using certain rules showed that with any positive integer, a meandering path of integers would always end up at "1". Now with this program, Reverse Collatz Conjecture.exe, instead of ending up "downstream" at "1", by using different rules it is possible to travel through various junctions where different forks can be chosen by the user which results in different meandering integer paths "upstream" with the same starting integer. If the final "upstream" integer is plugged into Collatz Conjecture.exe, the same meandering path is followed "downstream". The zip file contains the Windows executable, the source code, and a PDF with screen shots that fully explain the new "upstream" rules with examples. |
Source included - QB64 - 1.27 MB - 383 downloads
| Rating: 0/10 (0 votes)
|
Right Triangle Integer Triples.z by Chuck Mire (Rate this file/View comments) |
Generate multiple sets of Pythagorean Right Triangle Integer Triples, which are infinite in number. The Windows executable program has a "Help" screen which explains the algorithm I used. The zip file contains the source code, the Windows executable and two screen shots. |
Source included - QB64 - 558.41 KB - 1064 downloads
| Rating: 0/10 (0 votes)
|
Rock, Paper & Sissors.zip by Chuck Mire (Rate this file/View comments) |
This is the classic game you learned as a kid. Play against your computer while keeping a running score. Each session is different because the TIMER is used to initialize the random generator for each session. |
Source included - QB64 - 367.1 KB - 531 downloads
| Rating: 0/10 (0 votes)
|
Russian Multiplication.zip by Chuck Mire (Rate this file/View comments) |
Russian Multiplication - also known as Russian Peasant Multiplication - is a simple method of multiplication that only requires the ability to multiply by two, divide by two, and add. The attached zip file contains the Windows executable, the source code, and a PDF with two explanatory screen shots. |
Source included - QB64 - 482.67 KB - 675 downloads
| Rating: 0/10 (0 votes)
|
Page: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
|
|