For each of the links below, left click your mouse to view the file in your internet browser window. To download the file in its original format, right click on the link and select a "save" or "save target" option.
The link below to bring you to a text file (created with Notepad) that contains the strings of ciphertexts that appear in Exercises and Exercises for the Reader in the first five chapters. From this file, readers can copy and paste ciphertext passages directly into the platform-independent applets (below) or into any other cryptographic programs.Ciphertexts
A very nice set of platform-independent applets have been created by Eric Flior for some of the core programs of Chapters 1-6. The applets were created with java. They should be helpful for readers by allowing them to do deeper investigations and examples without the distraction of lengthy hand computations. Some of the exercises of Chapter 5 should only be done with the applets from that chapter (or by similar computer programs for readers with stronger computer backgrounds). Below is a brief list of the content programs for each chapter. The chapter names below are links to the corresponding applet pages.
Below are links to download individual programs for an assortment of algorithms and computer exercises from the book. The programs are written in MATLAB, which is a very user-friendly language, and many comments are included. (NOTE: In MATLAB comments appear after "%" symbols since anything appearing in a line after this symbol is ignored by MATLAB.) More information on how these programs operate and how corresponding programs can be written in any computing platform can be learned by looking at the computer implementation material appearing at the end of each chapter. Some programs below give reference to the computer exerise to which it corresponds.