January 2018
Intermediate to advanced
416 pages
10h 40m
English
“It is poor civic hygiene to install technologies that could someday facilitate a police state.”—Bruce Schneier, Secrets and Lies

The transposition programs seem to work pretty well at encrypting and decrypting different messages with various keys, but how do you know they always work? You can’t be absolutely sure the programs always work unless you test the encryptMessage() and decryptMessage() functions with all sorts of message and key parameter values. But this would take a lot of time because you’d have to type a message in the encryption program, set the key, run the encryption program, paste the ...