Chapter 3: Mono-alphabetic substitutions
Ciphertext in Example 3.1
Ciphertext in Example 3.3
Ciphertext in Example 3.4
Ciphertext in Example 3.13
Ciphertext in Example 3.15
Ciphertext in Example 3.16
Ciphertext in Example 3.17
Ciphertext in Example 3.21
Ciphertext in Example 3.22
Ciphertexts in Exercise 3.2
Ciphertexts in Exercise 3.7
Ciphertexts in Exercise 3.8
Ciphertexts in Exercise 3.16
Ciphertexts in Exercise 3.25
Ciphertexts in Exercise 3.27
Ciphertext in Exercise 3.29
Ciphertexts in Exercise 3.31
Chapter 4: Poly-alphabetic substitutions
Ciphertext in Example 4.1
Ciphertext in Examples 4.2 and 4.3
Ciphertext in Example 4.4
Ciphertext in Example 4.6
Ciphertext in Example 4.8
Ciphertext in Example 4.9
Ciphertext in Example 4.10
Ciphertext in Example 4.22
Ciphertext in Exercise 4.1
Ciphertexts in Exercise 4.3
Ciphertext in Exercises 4.4 and 4.5
Ciphertexts in Exercise 4.7
Ciphertext in Exercise 4.9
Ciphertexts in Exercise 4.13
Ciphertexts in Exercise 4.15
Ciphertext in Exercise 4.16
Ciphertexts in Exercise 4.18
Ciphertext in Exercise 4.31
Ciphertext in Exercise 4.32(b)
Chapter 5: Transposition ciphers
Ciphertext in Examples 5.1, 5.2, and 5.6
Ciphertext in Example 5.7
Ciphertext in Example 5.14
Ciphertext in Example 5.19
Ciphertexts in Exercise 5.3
Ciphertexts in Exercise 5.12
Ciphertexts in Exercise 5.20
Ciphertexts in Exercise 5.23
EnDeCrypt 3.0
Home
Cryptographic Ciphers
Cryptanalysis
Tools
Electronic ciphertexts
sitemap
+not-found