Copyright 2009 by Alexander Stanoyevitch, All Rights Reserved

Chapter 3: The Evolution of Codemaking Until the Computer Era

Index:

3.1: Affine Cipher Encryption and Decryption

3.3: Computing Compositions of Permutations

3.4: Computing Inverses of Permutations


3.1: Affine Cipher Encryption and Decryption

Encrypt and Decrypt text with the Affine Cipher (PLACEHOLDER)

Usage:


Top


3.2: Computing Compositions of Permutations

This program inputs two permutations, 1 and 2, on a set of integers 1, 2, 3, ... , n, and will output the composition of the two permutations, i.e., permutation 2 applied after permuation 1.

Usage:

    Permutation 1:  1 2 3 4

                    1 3 4 2

    Permutation 2:  1 2 3 4

                    4 1 2 3

Top


3.3: Computing Inverses of Permutations 

CE #10 

Usage:


Top