Chapter 3: Mono-alphabetic substitutions
Letter frequencies
Chapter 4: Poly-alphabetic substitutions
Kasiski analysis
Text splitter
Chapter 8: Fundamental notions underlying stream ciphers
Test key stream randomness
Chapter 9: Stream ciphers based on LFSRs
Berlekamp-Massey algorithm
EnDeCrypt 3.0
Home
Cryptographic Ciphers
Cryptanalysis
Tools
Help
sitemap
+not-found