Copyright
2009 by Alexander Stanoyevitch, All Rights Reserved
Chapter
3: The Evolution of Codemaking Until the Computer Era
Index:
3.1:
Affine Cipher Encryption and Decryption
Encrypt
and Decrypt text with the Affine Cipher (PLACEHOLDER)
Usage:
Top
3.2:
Computing Compositions of Permutations
This program inputs
two permutations, 1 and 2, on a set of integers 1, 2, 3, ... , n, and
will output the composition of the two permutations, i.e., permutation
2 applied after permuation 1.
Usage:
Permutation 1: 1 2 3 4
1 3 4 2
Permutation 2: 1 2 3 4
4 1 2 3
Top
3.3:
Computing Inverses of Permutations
CE
#10
Usage:
Top