Cryptography Reference
In-Depth Information
55
for(l=256; l--;) cnt[l] = 0;
56
for(l=m; l < N; l += len) ++cnt[((len+1+l) & 0xff)^
b[l]];
57
for(indx=max=0, l=256; l--;)
58
if(cnt[l] > max)
59
{
60
max = cnt[l];
61
indx = l;
/* ' \ 0' is preferred byte!
*/
62
}
63
k = indx;
64
}
65
}
66
if(bad) printf(INVERS);
67
if(k < 32) printf("^%c", k+'@');
68
else putchar(k);
69
if(bad) printf(NORMAL);
70
}
putchar('"'); putchar(' \ n');
71
72
}
73
return 0;
74
}
Figure 3.10: ( continued )
files, where the file names are passed as arguments. When two bytes in
two files differ, the program outputs the value 0x100, which corresponds
to no character at this place. You can see the result of these tests in the wp
field (lines 13 - 20 in the listing in Figure 3.10). Only insiders can check
whether or not these assumptions are always valid. No contradiction has
been found so far in practice. By the way, the number 40 for the field
length was selected relatively at random.
Search WWH ::




Custom Search