Chapter 3: Mono-alphabetic substitutions
Letter frequencies
Chapter 4: Poly-alphabetic substitutions
Kasiski analysis
Text splitter
Chapter 7: Fundamental notions underlying stream ciphers
Test keystream randomness
Chapter 8: Stream ciphers based on LFSRs
Berlekamp-Massey algorithm
EnDeCrypt 3.0