SlideShare una empresa de Scribd logo
1 de 3
COMP-U-STAT
STATISTICAL PATTERN GENERATOR AND MATHEMATICAL TREND ANALYZER
(c) Copyright 2015 by James Ervin Glover, Ph.D.
All Rights Reserved
Part VII(b) ( STAT 2593 ----> STAT 2596 )
The COMP-U-STAT System consists of a cluster of more than 3470
modular programs, providing the analyst with a clear and distinct
scientific and mathematical edge in generating novel and useful
statistical patterns for analyzing trends from random variables.
The following is a glossary describing the functions of all
routines in the sequence. There are many statistical applications
of the COMP-U-STAT cluster. The serious analyst is herein presented
a blueprint for a strictly scientific approach to analyzing and
solving a series of these veru fascinating and challenging problems.
=========================================================================
* * * ABSTRACTS OF COMP-U-STAT PROGRAMS 2593 ---> 2596 * * *
=========================================================================
-- L 2593 --
( ALPHANUMERIC ENCRYPTION ALGORITHM )
I
( STAT2593 ENCRYPTS AN ALPHANUMERIC FILE WITH LINES OF
LENGTH 72 CHARACTERS FROM PLAINTEXT TO CIPHERTEXT )
STAT2593 READS AN ALPHANUMERIC FILE FROM STAT2495.INP, A PRIVATE
KEY FROM STAT2594.KEY (PROVIDED BY THE TRANSMITTER TO THE USER),
UTILIZING AN INTERNALLY CREATED ALGORITHM TO ENCRYPT THE FILE FOR
SECURITY PURPOSES. EACH LINE OF STAT2594.INP IS RESTRICTED TO 72
CHARACTERS. THE ENCRYPTED OUPUT FILE IS RECORDED AS STAT2594.OUT,
UTILIZING THE CONGRUENCES C1 = aP1 + bP2 (mod 51) AND
C2 = cP1 + dP2 (mod 51) TO CONVERT CHARACTER BLOCKS OF SIZE n = 2
WITH, E.G., a = 2 , b = 3 , c = 5 AND d = 8 TO CONVERT 2-ELEMENT
STRINGS FROM PLAINTEXT TO CIPHERTEXT, WITH gcd(ad-bc,51) = 1. THUS
(ad-bc) AND 51 ARE TAKEN TO BE RELATIVELY PRIME FOR THE 26 INPUT
ALPHABETIC CHARACTERS, A ---> Z, IN UNION WITH A BLANK CHARACTER,
DIGITS 0 --> 9, AND A SELECTED SEQUENCE OF SPECIAL CHARACTERS.
=========================================================================
-- L 2594 --
( ALPHANUMERIC DECRYPTION ALGORITHM )
II
( STAT2594 DECRYPTS AN ALPHANUMERIC FILE WITH LINES OF
LENGTH 72 CHARACTERS FROM CIPHERTEXT TO PLAINTEXT )
STAT2594 READS AN ALPHANUMERIC FILE FROM STAT2495.INP, A PRIVATE
KEY FROM STAT2594.KEY (PROVIDED TO THE USER FROM THE TRANSMITTER),
UTILIZING AN INTERNALLY CREATED ALGORITHM TO DECRYPT THE FILE FOR
SECURITY PURPOSES. EACH LINE OF STAT2594.INP IS RESTRICTED TO 72
CHARACTERS. THE DECRYPTED OUPUT FILE IS RECORDED AS STAT2594.OUT,
UTILIZING THE CONGRUENCES P1 = dC1 - bC2 (mod 51) AND
P2 = -cC1 + aC2 (mod 51) TO CONVERT CHARACTER BLOCKS OF SIZE n = 2
WITH, E.G., a = 2 , b = 3 , c = 5 AND d = 8 TO CONVERT 2-ELEMENT
STRINGS FROM CIPHERTEXT TO PLAINTEXT, WITH gcd(ad-bc,51) = 1. THUS
(ad-bc) AND 51 ARE TAKEN TO BE RELATIVELY PRIME FOR THE 26 INPUT
ALPHABETIC CHARACTERS, A ---> Z, IN UNION WITH A BLANK CHARACTER,
DIGITS 0 --> 9, AND A SELECTED SEQUENCE OF SPECIAL CHARACTERS.
=========================================================================
-- L 2595 --
( NON-ALPHABETIC (BINARY) ENCRYPTION ALGORITHM )
III
( STAT2595 ENCRYPTS A NON-ALPHABETIC FILE WITH LINES OF
LENGTH 75 CHARACTERS FROM PLAINTEXT TO CIPHERTEXT )
STAT2595 READS A NON-ALPHABETIC FILE FROM STAT2595.INP, A RANDOMLY
GENERATED BINARY STRING OF LENGTH 75 (THE ENCRYPTION KEY) FROM
STAT2595.KEY, CONSISTING OF ELEMENTS FROM THE SET { 0,1 }, AND USES
AN INTERNALLY CREATED ALGORITHM TO ENCRYPT THE FILE FOR SECURITY.
EACH LINE OF INPUT FILE STAT2595.INP IS RESTRICTED TO 15 CHARACTERS,
EACH OF WHICH IS REPRESENTED INTERNALLY AS A STRING OF 5 BINARY
DIGITS. THE ENCRYPTED OUPUT FILE IS RECORDED AS STAT2595.OUT,
AUTOMATICALLY TRANSFORMING STAT2595.INP INTO A BINARY FILE FOR
PROCESSING. THE CIPHERTEXT IS GENERATED BY ADDING (MOD 2) THE DIGITS
WHICH HAVE EQUIVALENT INDICES IN THE TWO BINARY STRINGS. THE
RECIPIENT MUST POSSESS IN ADVANCE THE ENCRYPTION KEY. THEN THE
NUMERICAL PLAINTEXT CAN BE RECONSTRUCTED BY MERELY ADDING (MOD 2)
THE TWO CORRESPONDING DIGITS OF THE ENCRYPTION KEY AND THE
CIPHERTEXT. A COMPLETE TABLE OF BINARY EQUIVALENCES FOR THE 26
ALPHABETIC CHARACTERS , A ---> Z , IS AUTOMATICALLY INCLUDED IN THE
ALGORITHM AND RECORDED AS
=========================================================================
-- L 2596 --
( NON-ALPHABETIC (BINARY) DECRYPTION ALGORITHM )
IV
( STAT2596 DECRYPTS A NON-ALPHABETIC FILE WITH LINES OF
LENGTH 75 CHARACTERS FROM CIPHERTEXT TO PLAINTEXT )
STAT2596 READS A NON-ALPHABETIC FILE FROM STAT2596.INP, A RANDOMLY
GENERATED BINARY STRING OF LENGTH 75 (THE ENCRYPTION KEY) FROM
STAT2596.KEY, CONSISTING OF ELEMENTS FROM THE SET { 0,1 }, AND USES
AN INTERNALLY CREATED ALGORITHM TO DECRYPT THE FILE FOR SECURITY.
EACH LINE OF INPUT FILE STAT2596.INP IS RESTRICTED TO 15 CHARACTERS,
EACH OF WHICH IS REPRESENTED INTERNALLY AS A STRING OF 5 BINARY
DIGITS. THE DECRYPTED OUPUT FILE IS RECORDED AS STAT2596.OUT,
AUTOMATICALLY TRANSFORMING STAT2596.INP INTO A BINARY FILE FOR
PROCESSING. THE PLAINTEXT IS GENERATED BY ADDING (MOD 2) THE DIGITS
WHICH HAVE EQUIVALENT INDICES IN THE TWO BINARY STRINGS. THE
RECIPIENT MUST POSSESS IN ADVANCE THE ENCRYPTION KEY. THEN THE
NUMERICAL PLAINTEXT CAN BE RECONSTRUCTED BY MERELY ADDING (MOD 2)
THE TWO CORRESPONDING DIGITS OF THE ENCRYPTION KEY AND THE
CIPHERTEXT. A COMPLETE TABLE OF BINARY EQUIVALENCES FOR THE 26
ALPHABETIC CHARACTERS , A ---> Z , IS AUTOMATICALLY INCLUDED IN
THE ALGORITHM AND RECORDED AS STAT2596.OT5.
=========================================================================

Más contenido relacionado

La actualidad más candente

Lecture 8-9 block-diagram_representation_of_control_systems
Lecture 8-9 block-diagram_representation_of_control_systemsLecture 8-9 block-diagram_representation_of_control_systems
Lecture 8-9 block-diagram_representation_of_control_systemsSaifullah Memon
 
Block diagram representation 3
Block diagram representation 3Block diagram representation 3
Block diagram representation 3Syed Saeed
 
Block diagram reduction techniques
Block diagram reduction techniquesBlock diagram reduction techniques
Block diagram reduction techniquesSatheeshCS2
 
Block diagram representation 3
Block diagram representation 3Block diagram representation 3
Block diagram representation 3Syed Saeed
 
State-Space Realizations Using Control Canonical Form and Simulation Diagram
State-Space Realizations Using Control Canonical Form and Simulation DiagramState-Space Realizations Using Control Canonical Form and Simulation Diagram
State-Space Realizations Using Control Canonical Form and Simulation DiagramMIbrar4
 
Applied numerical methods lec2
Applied numerical methods lec2Applied numerical methods lec2
Applied numerical methods lec2Yasser Ahmed
 
Block diagram
Block diagramBlock diagram
Block diagramRaoZaid1
 
Feedback and Control Systems
Feedback and Control SystemsFeedback and Control Systems
Feedback and Control SystemsKristina Badec
 
Adbms 39 algorithms for project and set operations
Adbms 39 algorithms for project and set operationsAdbms 39 algorithms for project and set operations
Adbms 39 algorithms for project and set operationsVaibhav Khanna
 
Embedded programming u3 part 1
Embedded programming u3 part 1Embedded programming u3 part 1
Embedded programming u3 part 1Karthik Vivek
 
9. 8085 instruction set v
9. 8085 instruction set v9. 8085 instruction set v
9. 8085 instruction set vsandip das
 
SQL Macros - Game Changing Feature for SQL Developers?
SQL Macros - Game Changing Feature for SQL Developers?SQL Macros - Game Changing Feature for SQL Developers?
SQL Macros - Game Changing Feature for SQL Developers?Andrej Pashchenko
 
Polymorphic Table Functions in 18c
Polymorphic Table Functions in 18cPolymorphic Table Functions in 18c
Polymorphic Table Functions in 18cAndrej Pashchenko
 
Week 10 part 1 pe 6282 Block Diagrams
Week  10 part 1 pe 6282   Block DiagramsWeek  10 part 1 pe 6282   Block Diagrams
Week 10 part 1 pe 6282 Block DiagramsCharlton Inao
 

La actualidad más candente (20)

Lecture 8-9 block-diagram_representation_of_control_systems
Lecture 8-9 block-diagram_representation_of_control_systemsLecture 8-9 block-diagram_representation_of_control_systems
Lecture 8-9 block-diagram_representation_of_control_systems
 
Block diagram representation 3
Block diagram representation 3Block diagram representation 3
Block diagram representation 3
 
Block diagram reduction techniques
Block diagram reduction techniquesBlock diagram reduction techniques
Block diagram reduction techniques
 
Block diagram representation 3
Block diagram representation 3Block diagram representation 3
Block diagram representation 3
 
Stack
StackStack
Stack
 
State-Space Realizations Using Control Canonical Form and Simulation Diagram
State-Space Realizations Using Control Canonical Form and Simulation DiagramState-Space Realizations Using Control Canonical Form and Simulation Diagram
State-Space Realizations Using Control Canonical Form and Simulation Diagram
 
Applied numerical methods lec2
Applied numerical methods lec2Applied numerical methods lec2
Applied numerical methods lec2
 
Block diagram
Block diagramBlock diagram
Block diagram
 
Control Systems
Control SystemsControl Systems
Control Systems
 
Feedback and Control Systems
Feedback and Control SystemsFeedback and Control Systems
Feedback and Control Systems
 
130070119095_2151908
130070119095_2151908130070119095_2151908
130070119095_2151908
 
Adbms 39 algorithms for project and set operations
Adbms 39 algorithms for project and set operationsAdbms 39 algorithms for project and set operations
Adbms 39 algorithms for project and set operations
 
Embedded programming u3 part 1
Embedded programming u3 part 1Embedded programming u3 part 1
Embedded programming u3 part 1
 
9. 8085 instruction set v
9. 8085 instruction set v9. 8085 instruction set v
9. 8085 instruction set v
 
SQL Macros - Game Changing Feature for SQL Developers?
SQL Macros - Game Changing Feature for SQL Developers?SQL Macros - Game Changing Feature for SQL Developers?
SQL Macros - Game Changing Feature for SQL Developers?
 
Polymorphic Table Functions in 18c
Polymorphic Table Functions in 18cPolymorphic Table Functions in 18c
Polymorphic Table Functions in 18c
 
C# p2
C# p2C# p2
C# p2
 
Quiz
QuizQuiz
Quiz
 
Block diagram reduction techniques
Block diagram reduction techniquesBlock diagram reduction techniques
Block diagram reduction techniques
 
Week 10 part 1 pe 6282 Block Diagrams
Week  10 part 1 pe 6282   Block DiagramsWeek  10 part 1 pe 6282   Block Diagrams
Week 10 part 1 pe 6282 Block Diagrams
 

Destacado

서울시 미세먼지 데이터 분석
서울시 미세먼지 데이터 분석서울시 미세먼지 데이터 분석
서울시 미세먼지 데이터 분석SKKU
 
Alan H Goldsmith Resume 2015
Alan H Goldsmith Resume 2015Alan H Goldsmith Resume 2015
Alan H Goldsmith Resume 2015ALAN H GOLDSMITH
 
The breathtaking decline
The breathtaking declineThe breathtaking decline
The breathtaking declineanvithaphutane
 
Применение трехмерного лазерного сканирования при модернизации гидротехничес...
Применение трехмерного  лазерного сканирования при модернизации гидротехничес...Применение трехмерного  лазерного сканирования при модернизации гидротехничес...
Применение трехмерного лазерного сканирования при модернизации гидротехничес...SAPR-Peterburg
 
ложная мята (false mint)
ложная мята (false mint)ложная мята (false mint)
ложная мята (false mint)Larixko
 
Coursework bba 3001
Coursework bba 3001Coursework bba 3001
Coursework bba 3001Monie Joey
 
Results_Prof.Ahmed Rafique Aziz
Results_Prof.Ahmed Rafique AzizResults_Prof.Ahmed Rafique Aziz
Results_Prof.Ahmed Rafique AzizAhmed Aziz
 
RESUME of Engineer Ahmed R . Aziz _EEE 2016
RESUME of Engineer Ahmed R . Aziz _EEE 2016RESUME of Engineer Ahmed R . Aziz _EEE 2016
RESUME of Engineer Ahmed R . Aziz _EEE 2016Ahmed Aziz
 
Передовые производственные технологии в строительстве формируют новые стандар...
Передовые производственные технологии в строительстве формируют новые стандар...Передовые производственные технологии в строительстве формируют новые стандар...
Передовые производственные технологии в строительстве формируют новые стандар...SAPR-Peterburg
 
Рецепт яблоки с корицей под штрейзелем
Рецепт яблоки с корицей под штрейзелемРецепт яблоки с корицей под штрейзелем
Рецепт яблоки с корицей под штрейзелемLarixko
 
Resume Ashish Shah
Resume Ashish ShahResume Ashish Shah
Resume Ashish ShahAshish Shah
 

Destacado (19)

서울시 미세먼지 데이터 분석
서울시 미세먼지 데이터 분석서울시 미세먼지 데이터 분석
서울시 미세먼지 데이터 분석
 
E commerce
E commerce E commerce
E commerce
 
Alan H Goldsmith Resume 2015
Alan H Goldsmith Resume 2015Alan H Goldsmith Resume 2015
Alan H Goldsmith Resume 2015
 
The breathtaking decline
The breathtaking declineThe breathtaking decline
The breathtaking decline
 
Применение трехмерного лазерного сканирования при модернизации гидротехничес...
Применение трехмерного  лазерного сканирования при модернизации гидротехничес...Применение трехмерного  лазерного сканирования при модернизации гидротехничес...
Применение трехмерного лазерного сканирования при модернизации гидротехничес...
 
GLOVER_NFFP_04_Tech_Rpt
GLOVER_NFFP_04_Tech_RptGLOVER_NFFP_04_Tech_Rpt
GLOVER_NFFP_04_Tech_Rpt
 
ложная мята (false mint)
ложная мята (false mint)ложная мята (false mint)
ложная мята (false mint)
 
Coursework bba 3001
Coursework bba 3001Coursework bba 3001
Coursework bba 3001
 
Results_Prof.Ahmed Rafique Aziz
Results_Prof.Ahmed Rafique AzizResults_Prof.Ahmed Rafique Aziz
Results_Prof.Ahmed Rafique Aziz
 
builders logo
builders logobuilders logo
builders logo
 
techsumm
techsummtechsumm
techsumm
 
RESUME of Engineer Ahmed R . Aziz _EEE 2016
RESUME of Engineer Ahmed R . Aziz _EEE 2016RESUME of Engineer Ahmed R . Aziz _EEE 2016
RESUME of Engineer Ahmed R . Aziz _EEE 2016
 
1MALD-Ltg Cessation-draft-b
1MALD-Ltg Cessation-draft-b1MALD-Ltg Cessation-draft-b
1MALD-Ltg Cessation-draft-b
 
Передовые производственные технологии в строительстве формируют новые стандар...
Передовые производственные технологии в строительстве формируют новые стандар...Передовые производственные технологии в строительстве формируют новые стандар...
Передовые производственные технологии в строительстве формируют новые стандар...
 
Рецепт яблоки с корицей под штрейзелем
Рецепт яблоки с корицей под штрейзелемРецепт яблоки с корицей под штрейзелем
Рецепт яблоки с корицей под штрейзелем
 
Rug Cleaning
Rug Cleaning Rug Cleaning
Rug Cleaning
 
Resume Ashish Shah
Resume Ashish ShahResume Ashish Shah
Resume Ashish Shah
 
cv i
cv icv i
cv i
 
Jhoann 24
Jhoann 24Jhoann 24
Jhoann 24
 

Similar a ENCRYPT.DOC

Indexes From the Concept to Internals
Indexes From the Concept to InternalsIndexes From the Concept to Internals
Indexes From the Concept to InternalsDeiby Gómez
 
Exadata - Smart Scan Testing
Exadata - Smart Scan TestingExadata - Smart Scan Testing
Exadata - Smart Scan TestingMonowar Mukul
 
All on Adaptive and Extended Cursor Sharing
All on Adaptive and Extended Cursor SharingAll on Adaptive and Extended Cursor Sharing
All on Adaptive and Extended Cursor SharingMohamed Houri
 
12c SQL Plan Directives
12c SQL Plan Directives12c SQL Plan Directives
12c SQL Plan DirectivesFranck Pachot
 
Oracle Database 12c Application Development
Oracle Database 12c Application DevelopmentOracle Database 12c Application Development
Oracle Database 12c Application DevelopmentSaurabh K. Gupta
 
Advanced tips of dbms statas
Advanced tips of dbms statasAdvanced tips of dbms statas
Advanced tips of dbms statasLouis liu
 
Understanding Query Optimization with ‘regular’ and ‘Exadata’ Oracle
Understanding Query Optimization with ‘regular’ and ‘Exadata’ OracleUnderstanding Query Optimization with ‘regular’ and ‘Exadata’ Oracle
Understanding Query Optimization with ‘regular’ and ‘Exadata’ OracleGuatemala User Group
 
Sq lite functions
Sq lite functionsSq lite functions
Sq lite functionspunu_82
 
Advance Features In Procedues And Triggers
Advance Features In Procedues And TriggersAdvance Features In Procedues And Triggers
Advance Features In Procedues And TriggersKeshav Murthy
 
Understand the Query Plan to Optimize Performance with EXPLAIN and EXPLAIN AN...
Understand the Query Plan to Optimize Performance with EXPLAIN and EXPLAIN AN...Understand the Query Plan to Optimize Performance with EXPLAIN and EXPLAIN AN...
Understand the Query Plan to Optimize Performance with EXPLAIN and EXPLAIN AN...EDB
 
Wellington APAC Groundbreakers tour - Upgrading to the 12c Optimizer
Wellington APAC Groundbreakers tour - Upgrading to the 12c OptimizerWellington APAC Groundbreakers tour - Upgrading to the 12c Optimizer
Wellington APAC Groundbreakers tour - Upgrading to the 12c OptimizerConnor McDonald
 
SQL Functions and Operators
SQL Functions and OperatorsSQL Functions and Operators
SQL Functions and OperatorsMohan Kumar.R
 

Similar a ENCRYPT.DOC (20)

Indexes From the Concept to Internals
Indexes From the Concept to InternalsIndexes From the Concept to Internals
Indexes From the Concept to Internals
 
Exadata - Smart Scan Testing
Exadata - Smart Scan TestingExadata - Smart Scan Testing
Exadata - Smart Scan Testing
 
Hspice tut
Hspice tutHspice tut
Hspice tut
 
All on Adaptive and Extended Cursor Sharing
All on Adaptive and Extended Cursor SharingAll on Adaptive and Extended Cursor Sharing
All on Adaptive and Extended Cursor Sharing
 
12c SQL Plan Directives
12c SQL Plan Directives12c SQL Plan Directives
12c SQL Plan Directives
 
Oracle Database 12c Application Development
Oracle Database 12c Application DevelopmentOracle Database 12c Application Development
Oracle Database 12c Application Development
 
Advanced tips of dbms statas
Advanced tips of dbms statasAdvanced tips of dbms statas
Advanced tips of dbms statas
 
Oracle 12c SPM
Oracle 12c SPMOracle 12c SPM
Oracle 12c SPM
 
Understanding Query Optimization with ‘regular’ and ‘Exadata’ Oracle
Understanding Query Optimization with ‘regular’ and ‘Exadata’ OracleUnderstanding Query Optimization with ‘regular’ and ‘Exadata’ Oracle
Understanding Query Optimization with ‘regular’ and ‘Exadata’ Oracle
 
Sq lite functions
Sq lite functionsSq lite functions
Sq lite functions
 
Advance Features In Procedues And Triggers
Advance Features In Procedues And TriggersAdvance Features In Procedues And Triggers
Advance Features In Procedues And Triggers
 
5 Cool Things About SQL
5 Cool Things About SQL5 Cool Things About SQL
5 Cool Things About SQL
 
Compilers
CompilersCompilers
Compilers
 
Oracle 11g caracteristicas poco documentadas 3 en 1
Oracle 11g caracteristicas poco documentadas 3 en 1Oracle 11g caracteristicas poco documentadas 3 en 1
Oracle 11g caracteristicas poco documentadas 3 en 1
 
Understand the Query Plan to Optimize Performance with EXPLAIN and EXPLAIN AN...
Understand the Query Plan to Optimize Performance with EXPLAIN and EXPLAIN AN...Understand the Query Plan to Optimize Performance with EXPLAIN and EXPLAIN AN...
Understand the Query Plan to Optimize Performance with EXPLAIN and EXPLAIN AN...
 
Sql queries
Sql queriesSql queries
Sql queries
 
Do You Know The 11g Plan?
Do You Know The 11g Plan?Do You Know The 11g Plan?
Do You Know The 11g Plan?
 
Wellington APAC Groundbreakers tour - Upgrading to the 12c Optimizer
Wellington APAC Groundbreakers tour - Upgrading to the 12c OptimizerWellington APAC Groundbreakers tour - Upgrading to the 12c Optimizer
Wellington APAC Groundbreakers tour - Upgrading to the 12c Optimizer
 
SQL Functions and Operators
SQL Functions and OperatorsSQL Functions and Operators
SQL Functions and Operators
 
Lwrb ms
Lwrb msLwrb ms
Lwrb ms
 

Más de James Ervin Glover, Ph.D. (12)

Statistical Forecasting of Lightning Cessation _ PPT Presentation
Statistical Forecasting of Lightning Cessation _ PPT PresentationStatistical Forecasting of Lightning Cessation _ PPT Presentation
Statistical Forecasting of Lightning Cessation _ PPT Presentation
 
Glover nffp 04_tech_rpt
Glover nffp 04_tech_rptGlover nffp 04_tech_rpt
Glover nffp 04_tech_rpt
 
Exec-u-Net
Exec-u-NetExec-u-Net
Exec-u-Net
 
Exec-u-Net
Exec-u-NetExec-u-Net
Exec-u-Net
 
Exec-u-Net
Exec-u-NetExec-u-Net
Exec-u-Net
 
INTERPOL
INTERPOLINTERPOL
INTERPOL
 
NSRPE
NSRPENSRPE
NSRPE
 
PROFACC
PROFACCPROFACC
PROFACC
 
UCT
UCTUCT
UCT
 
RESPUB
RESPUBRESPUB
RESPUB
 
Titan_IV
Titan_IVTitan_IV
Titan_IV
 
AMIP
AMIPAMIP
AMIP
 

ENCRYPT.DOC

  • 1. COMP-U-STAT STATISTICAL PATTERN GENERATOR AND MATHEMATICAL TREND ANALYZER (c) Copyright 2015 by James Ervin Glover, Ph.D. All Rights Reserved Part VII(b) ( STAT 2593 ----> STAT 2596 ) The COMP-U-STAT System consists of a cluster of more than 3470 modular programs, providing the analyst with a clear and distinct scientific and mathematical edge in generating novel and useful statistical patterns for analyzing trends from random variables. The following is a glossary describing the functions of all routines in the sequence. There are many statistical applications of the COMP-U-STAT cluster. The serious analyst is herein presented a blueprint for a strictly scientific approach to analyzing and solving a series of these veru fascinating and challenging problems. ========================================================================= * * * ABSTRACTS OF COMP-U-STAT PROGRAMS 2593 ---> 2596 * * * ========================================================================= -- L 2593 -- ( ALPHANUMERIC ENCRYPTION ALGORITHM ) I ( STAT2593 ENCRYPTS AN ALPHANUMERIC FILE WITH LINES OF LENGTH 72 CHARACTERS FROM PLAINTEXT TO CIPHERTEXT ) STAT2593 READS AN ALPHANUMERIC FILE FROM STAT2495.INP, A PRIVATE KEY FROM STAT2594.KEY (PROVIDED BY THE TRANSMITTER TO THE USER), UTILIZING AN INTERNALLY CREATED ALGORITHM TO ENCRYPT THE FILE FOR SECURITY PURPOSES. EACH LINE OF STAT2594.INP IS RESTRICTED TO 72 CHARACTERS. THE ENCRYPTED OUPUT FILE IS RECORDED AS STAT2594.OUT, UTILIZING THE CONGRUENCES C1 = aP1 + bP2 (mod 51) AND C2 = cP1 + dP2 (mod 51) TO CONVERT CHARACTER BLOCKS OF SIZE n = 2 WITH, E.G., a = 2 , b = 3 , c = 5 AND d = 8 TO CONVERT 2-ELEMENT STRINGS FROM PLAINTEXT TO CIPHERTEXT, WITH gcd(ad-bc,51) = 1. THUS (ad-bc) AND 51 ARE TAKEN TO BE RELATIVELY PRIME FOR THE 26 INPUT ALPHABETIC CHARACTERS, A ---> Z, IN UNION WITH A BLANK CHARACTER, DIGITS 0 --> 9, AND A SELECTED SEQUENCE OF SPECIAL CHARACTERS. ========================================================================= -- L 2594 -- ( ALPHANUMERIC DECRYPTION ALGORITHM ) II ( STAT2594 DECRYPTS AN ALPHANUMERIC FILE WITH LINES OF LENGTH 72 CHARACTERS FROM CIPHERTEXT TO PLAINTEXT ) STAT2594 READS AN ALPHANUMERIC FILE FROM STAT2495.INP, A PRIVATE KEY FROM STAT2594.KEY (PROVIDED TO THE USER FROM THE TRANSMITTER),
  • 2. UTILIZING AN INTERNALLY CREATED ALGORITHM TO DECRYPT THE FILE FOR SECURITY PURPOSES. EACH LINE OF STAT2594.INP IS RESTRICTED TO 72 CHARACTERS. THE DECRYPTED OUPUT FILE IS RECORDED AS STAT2594.OUT, UTILIZING THE CONGRUENCES P1 = dC1 - bC2 (mod 51) AND P2 = -cC1 + aC2 (mod 51) TO CONVERT CHARACTER BLOCKS OF SIZE n = 2 WITH, E.G., a = 2 , b = 3 , c = 5 AND d = 8 TO CONVERT 2-ELEMENT STRINGS FROM CIPHERTEXT TO PLAINTEXT, WITH gcd(ad-bc,51) = 1. THUS (ad-bc) AND 51 ARE TAKEN TO BE RELATIVELY PRIME FOR THE 26 INPUT ALPHABETIC CHARACTERS, A ---> Z, IN UNION WITH A BLANK CHARACTER, DIGITS 0 --> 9, AND A SELECTED SEQUENCE OF SPECIAL CHARACTERS. ========================================================================= -- L 2595 -- ( NON-ALPHABETIC (BINARY) ENCRYPTION ALGORITHM ) III ( STAT2595 ENCRYPTS A NON-ALPHABETIC FILE WITH LINES OF LENGTH 75 CHARACTERS FROM PLAINTEXT TO CIPHERTEXT ) STAT2595 READS A NON-ALPHABETIC FILE FROM STAT2595.INP, A RANDOMLY GENERATED BINARY STRING OF LENGTH 75 (THE ENCRYPTION KEY) FROM STAT2595.KEY, CONSISTING OF ELEMENTS FROM THE SET { 0,1 }, AND USES AN INTERNALLY CREATED ALGORITHM TO ENCRYPT THE FILE FOR SECURITY. EACH LINE OF INPUT FILE STAT2595.INP IS RESTRICTED TO 15 CHARACTERS, EACH OF WHICH IS REPRESENTED INTERNALLY AS A STRING OF 5 BINARY DIGITS. THE ENCRYPTED OUPUT FILE IS RECORDED AS STAT2595.OUT, AUTOMATICALLY TRANSFORMING STAT2595.INP INTO A BINARY FILE FOR PROCESSING. THE CIPHERTEXT IS GENERATED BY ADDING (MOD 2) THE DIGITS WHICH HAVE EQUIVALENT INDICES IN THE TWO BINARY STRINGS. THE RECIPIENT MUST POSSESS IN ADVANCE THE ENCRYPTION KEY. THEN THE NUMERICAL PLAINTEXT CAN BE RECONSTRUCTED BY MERELY ADDING (MOD 2) THE TWO CORRESPONDING DIGITS OF THE ENCRYPTION KEY AND THE CIPHERTEXT. A COMPLETE TABLE OF BINARY EQUIVALENCES FOR THE 26 ALPHABETIC CHARACTERS , A ---> Z , IS AUTOMATICALLY INCLUDED IN THE ALGORITHM AND RECORDED AS ========================================================================= -- L 2596 -- ( NON-ALPHABETIC (BINARY) DECRYPTION ALGORITHM ) IV ( STAT2596 DECRYPTS A NON-ALPHABETIC FILE WITH LINES OF LENGTH 75 CHARACTERS FROM CIPHERTEXT TO PLAINTEXT ) STAT2596 READS A NON-ALPHABETIC FILE FROM STAT2596.INP, A RANDOMLY GENERATED BINARY STRING OF LENGTH 75 (THE ENCRYPTION KEY) FROM STAT2596.KEY, CONSISTING OF ELEMENTS FROM THE SET { 0,1 }, AND USES AN INTERNALLY CREATED ALGORITHM TO DECRYPT THE FILE FOR SECURITY. EACH LINE OF INPUT FILE STAT2596.INP IS RESTRICTED TO 15 CHARACTERS, EACH OF WHICH IS REPRESENTED INTERNALLY AS A STRING OF 5 BINARY DIGITS. THE DECRYPTED OUPUT FILE IS RECORDED AS STAT2596.OUT, AUTOMATICALLY TRANSFORMING STAT2596.INP INTO A BINARY FILE FOR PROCESSING. THE PLAINTEXT IS GENERATED BY ADDING (MOD 2) THE DIGITS WHICH HAVE EQUIVALENT INDICES IN THE TWO BINARY STRINGS. THE RECIPIENT MUST POSSESS IN ADVANCE THE ENCRYPTION KEY. THEN THE NUMERICAL PLAINTEXT CAN BE RECONSTRUCTED BY MERELY ADDING (MOD 2) THE TWO CORRESPONDING DIGITS OF THE ENCRYPTION KEY AND THE CIPHERTEXT. A COMPLETE TABLE OF BINARY EQUIVALENCES FOR THE 26
  • 3. ALPHABETIC CHARACTERS , A ---> Z , IS AUTOMATICALLY INCLUDED IN THE ALGORITHM AND RECORDED AS STAT2596.OT5. =========================================================================