Chapter 3: Mono-alphabetic substitutions
Ciphertext in Example 3.1
Ciphertext in Example 3.3
Ciphertext in Example 3.4
Ciphertext in Example 3.13
Ciphertext in Example 3.15
Ciphertext in Example 3.16
Ciphertext in Example 3.17
Ciphertext in Example 3.21
Ciphertext in Example 3.22
Ciphertexts in Exercise 3.2
Ciphertexts in Exercise 3.7
Ciphertexts in Exercise 3.8
Ciphertexts in Exercise 3.16
Ciphertexts in Exercise 3.25
Ciphertexts in Exercise 3.27
Ciphertext in Exercise 3.29
Ciphertexts in Exercise 3.31
Chapter 4: Poly-alphabetic substitutions
Ciphertext in Example 4.1
Ciphertext in Examples 4.2 and 4.3
Ciphertext in Example 4.4
Ciphertext in Example 4.6
Ciphertext in Example 4.8
Ciphertext in Example 4.9
Ciphertext in Example 4.10
Ciphertext in Example 4.22
Ciphertext in Exercise 4.1
Ciphertexts in Exercise 4.3
Ciphertext in Exercises 4.4 and 4.5
Ciphertexts in Exercise 4.7
Ciphertext in Exercise 4.9
Ciphertexts in Exercise 4.13
Ciphertexts in Exercise 4.15
Ciphertext in Exercise 4.16
Ciphertexts in Exercise 4.18
Ciphertext in Exercise 4.31
Ciphertext in Exercise 4.32(b)
Chapter 5: Transposition ciphers
Ciphertext in Examples 5.1, 5.2, and 5.6
Ciphertext in Example 5.7
Ciphertext in Example 5.14
Ciphertext in Example 5.19
Ciphertexts in Exercise 5.3
Ciphertexts in Exercise 5.12
Ciphertexts in Exercise 5.20
Ciphertexts in Exercise 5.23
EnDeCrypt 3.0