Chapter
Licensed
Unlicensed
Requires Authentication
3. Transposition Ciphers
-
Joshua Holden
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xi
- Acknowledgments xiii
- 1. Introduction to Ciphers and Substitution 1
- 2. Polyalphabetic Substitution Ciphers 29
- 3. Transposition Ciphers 75
- 4. Ciphers and Computers 109
- 5. Stream Ciphers 145
- 6. Ciphers Involving Exponentiation 182
- 7. Public-Key Ciphers 201
- 8. Other Public-Key Systems 241
- 9. The Future of Cryptography 276
- List of Symbols 303
- Notes 305
- Suggestions for Further Reading 345
- Bibliography 349
- Index 367
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xi
- Acknowledgments xiii
- 1. Introduction to Ciphers and Substitution 1
- 2. Polyalphabetic Substitution Ciphers 29
- 3. Transposition Ciphers 75
- 4. Ciphers and Computers 109
- 5. Stream Ciphers 145
- 6. Ciphers Involving Exponentiation 182
- 7. Public-Key Ciphers 201
- 8. Other Public-Key Systems 241
- 9. The Future of Cryptography 276
- List of Symbols 303
- Notes 305
- Suggestions for Further Reading 345
- Bibliography 349
- Index 367