8DECRYPTING WITH THE TRANSPOSITION CIPHER

“Weakening encryption or creating backdoors to encrypted devices and data for use by the good guys would actually create vulnerabilities to be exploited by the bad guys.”—Tim Cook, CEO of Apple, 2015

Images

Unlike the Caesar cipher, the decryption process for the transposition cipher is different from the encryption process. In this chapter, you’ll create a separate program named transpositionDecrypt.py to handle decryption.

How to Decrypt ...

Get Cracking Codes with Python now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.