4. Modern Symmetric Ciphers
Table e46.2
Monoalphabetic Substitution Cipher
X | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
y | 3 | 0 | 5 | 2 | 7 | 4 | 1 | 6 |
Table e46.3
Transposition Cipher
1 | 2 | 3 | 4 | 5 |
3 | 1 | 4 | 5 | 2 |
Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.