15 Additional encryption methods
The techniques we have described in this book so far comprise many of the encryption algorithms used before cipher machines and computers were invented. If you encounter a cryptogram created prior to 1900, chances are very high that the encryption method used is covered in this book. The same is true if you are dealing with an encrypted letter, postcard, or diary, no matter when it was written. Many encrypted documents from the twentieth century are encrypted using one of the systems mentioned in this book, as well—especially those that have no military or intelligence connection.
Nevertheless, there are many ...
Get Codebreaking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.