Cryptosystems Journal
    Volume Two Number One
    Table of Contents

    Communications

    
    From the Editor .............................................. 2
    To the Editor ................................................ 6
    What Others Are Saying About Cryptosystems Journal .......... 10
    
    

    My Programs

    
    The Diskettes ............................................... 11
    The SUB-ROSA Cryptosystem ................................... 15
    The Eclipse Cryptosystem .................................... 19
    APL -- A Programming Language ............................... 20
    IBM's APL Interpreter for the PC ............................ 22
    The Lorenz Attractor ........................................ 23
    
    

    Details of Concepts Embodied in My Programs

    
    PC Memory Architecture ...................................... 24
    Extended Memory ............................................. 28
    Random Number Generators .................................... 34
    The Reusable RNG Random-Number-Generator Unit ............... 36
    Asynchronous Random Number Generators ....................... 38
    Parallel Printer Input/Output ............................... 41
    Parallel Printer Ports ...................................... 43
    Parallel Printer Signals .................................... 45
    The Prototype RANGER Device ................................. 47
    RANGER: Theory of Operation ................................. 50
    
    
    

    Galois Fields

    
    Why Study Galois Fields? .................................... 55
    Explanation of Galois Field GF(p) ........................... 56
    A Pair of GF(p) Inverse Matrices ............................ 63
    A Cryptosystem Diagram ...................................... 65
    A Worked-Through Example of a GF(p) Cryptosystem ............ 66
    Explanation of Galois Field GF(q^n) ......................... 71
    A Pair of GF(q^n) Inverse Matrices .......................... 72
    A Worked-Through Example of a GF(q^n) Cryptosystem .......... 76
    
    
    

    Other Articles

    
    Use a NSA Computer! ......................................... 82
    John Taber's CRYPT program .................................. 85
    Mario Maniscalco's CRYPT Program ............................ 86
    Character Graphics -- Boxes ................................. 88
    ANSI.SYS Color Functions .................................... 91
    Integrated Circuit Wafers ................................... 92
    Intel Microprocessors: Past, Present, and Future ............ 94
    Crypto Job Available ........................................ 96
    Review of "AFCEA Information Security Report" ............... 97
    Review of "Security for VAX Systems" ....................... 101
    Review of "Fractal Programming in C" ....................... 102
    Review of "The Winn Rosch Hardware Bible" .................. 103
    Review of "Assignment: Pentagon" ........................... 104
    Computer Tape-Worms and Viruses ............................ 105
    Sources of Information for Further Study ................... 106
    ECLIPSE Cryptosystem APL Source Code Listings .............. 111
    ECLIPSE Cryptosystem Sample Workspace Executions ........... 120
    The End .................................................... 125
    
    

    Return to Cryptosystems Journal Home Page
    Next Page ("Volume Two Number Two")
    Previous Page ("Volume One Number Three Table of Contents")

    Copyright © 1997 Cryptosystems Journal.

    Most recent update on 19-JAN-97.