Manual of cryptography

Front Cover
Aegean Park Press, 1977 - Language Arts & Disciplines - 193 pages
0 Reviews

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Literal substitution systems
12
Polyalphabetic systems
19
Devices for polyalphabetic encipherment
32
Fractionating systems of substitution SS 35 General
38
Checkerboard system Collon 89
39
German field cipher 1918
41
The Dclastelle systems
42
Literal double cncipherment
44
Cryptograms with incomplete rotary grilles
91
Characteristics of literal substitution systems
92
Characteristics of polyalphabetic cryptograms autoenciphercd by plaintext
93
Characteristics of polyalphabetic cryptograms autoenciphercd by cipher text
94
Cryptanalysis of literal substitution cryptograms
95
Polyalphabetic cryptograms with a fixed key
98
Example of the solution of a polyalphabetic cryptogram with a fixed key
100
General method KerckhofTs for all fixed key polyalphabetic systems
102

Digraphio substitution and transposition
45
Cryptographic machines
47
Polyalphabctic cipher machines
48
Fractionating or cryptotelcgraphic cipher machines
56
Code Systems
58
Two kinds of codes
59
Secondary encipherment or superencipherment of codes
60
Superencipherment by literal substitutionadditive and subtractivo keys
61
Mixed superencipherment by transposition and substitution
62
Superencipherment by pronounceable words
64
Selection of code words
65
The use of superenciphering tables
66
Pabt II
68
Circumstances that may favor cryptanalysis
69
Preliminary discussion of various cryptographic systems
70
Characteristic data of the principal language
72
French
73
Spanish
74
English
75
Cryptanalysis of transposition systems
77
Method of solution common to all systems of transposition
78
Simple rectangular transposition
81
Keyed transposition with an incompletely filled reotangle
84
Keyed transposition when the beginning or the end of the cryptogram is known
85
Keyed transposition of cryptograms having a similar ending
86
Transposition with rotary grilles
90
Solution of ciphers autoenciphered by plain text
103
Solution of ciphers autoenciphered by cipher text
105
Cryptanalysis of fractionating substitution systems
118
Cryptanalysis of checkerboard systems of the Collon typo
119
Cryptanalysis of the German field system
121
Cryptanalysis of the Delastclle systems
123
Cryptanalysis of code systems
131
General considerations concerning cryptanalysis of codes
132
Cryptanalysis of paged codes not superenciphered
133
Cryptanalysis of twopart codes not superenciphered
135
Cryptanalysis of superenciphered codes
138
Cryptanalysis of unknown superenciphered codes
140
Conclusions concerning codes or enciphering codes
142
Cryptanalysis of cipher machines
143
Cryptanalysis of cryptotclegraphic machines
145
Polygraphic machines
152
Part III
154
Ciphers for politicomilitary communications
155
Ciphers for the military communications of minor commands below the division
156
Rules for the compilation of ciphers l
157
Dissimulated and conventional expressions
158
Cipher Drums
169
Appendix No 2
175
Graphs of letter frequencies and of contacts with the most frequent letter Italian
182
Tabulation of the frequencies of single letters and digraphs based on 10000 letters German
189
Copyright

Bibliographic information