Aims and methods of cryptography --;Encryption steps: simple substitution --;Encryption steps: polygraphic substitution and coding --;Encryption steps: linear substitution --;Encryption steps: transposition --;Polyalphabetic encryption: families of alphabets --;Polyalphabetic encryption: keys --;Composition of classes of methods --;Open encryption key systems --;Encryption security --;Exhausting combinatorial complexity --;Anatomy of language: patterns --;Polyalphabetic case: probable words --;Anatomy of language: frequencies --;Kappa and Chi --;Periodicity examination --;Alignment of accompanying alphabets --;Compromises --;Linear basis analysis --;Anagramming.
SUMMARY OR ABSTRACT
Text of Note
Cryptology is rapidly gaining in practical importance for the protection of communication channels, databases and software. The first part of this book deals with codes and their uses (cryptography), whilst the second deals with the process of covertly decrypting a secret code (cryptanalysis).