CONTENTS
1.1 The Lexicon of Cryptography
1.5 Thomas Jefferson and the M-94
1.7 Cryptography and Computers
1.8 The National Security Agency
1.10 No Sex, Money, Crime or … Love
1.11 An Example of the Inference Process in Cryptanalysis
CHAPTER 2 COLUMNAR TRANSPOSITION
2.1 Shannon's Classification of Secrecy Transformations
2.2 The Rules of Columnar Transposition Encipherment
2.7 Deriving the Parameters of a Markov Model from Sliding Window Counts
2.9 The ADFGVX Transposition System
2.11 Columnar Transposition Problems
CHAPTER 3 MONOALPHABETIC SUBSTITUTION
3.1 Monoalphabetic Substitution
3.4 The χ2-Test of a Hypothesis
3.5 Pruning from the Table of Isomorphs
3.6 Partial Maximum Likelihood Estimation of a Monoalphabetic Substitution
3.7 The Hidden Markov Model (HMM)
3.8 Hill Encipherment of ASCII N-Grams
3.10 Monoalphabetic Substitution Problems
CHAPTER 4 POLYALPHABETIC SUBSTITUTION
4.5 Finding the Key of Vernam–Vigenère Ciphertext with Known Period by Correlation
Get Computer Security and Cryptography now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.