Qsr Nrwn

Website


Classical
Cryptography
Course

by Lanaki

Started on September 27th 1995
Revision 0
© 1995-2004, All Rights Reserved

Index

Volumes I & II

Index of Classical Cryptography Course

Lesson 1

Simple substitution

Lesson 2

Substitution with variants I

Lesson 3

Substitution with variants II

Lesson 4

Substitution with variants III

Lesson 5

Xenocrypt morphology I

Lesson 6

Xenocrypt morphology II

Lesson 7: Xenocrypt morphology III

Lesson 8

Ledge Introduction to cryptarithms I.
Hill Cipher

Lesson 9

German reduction ciphers. Enigma in historical and modern times

Lesson 10: Polyalphabetic substitution systems I.
Viggy's family and Quagmires I - IV.
Application of the principals of symmetry

Lesson 11: Polyalphabetic substitution systems II.
Cryptanalysis of Viggy's family.

Lesson 12: Polyalphabetic substitution systems III.
Cryptanalysis of Viggy's extended family.
Decimation in detail

Lesson 13: Aperiodic systems.
Improving cryptographic security in polyalphabetic systems.

Lesson 14: Ledge's introduction to cryptarithms II

Lesson 15: Statistical attacks

Lesson 16: Transposition

Lesson 17: Headline Puzzles, Playfair, Foursquare, Fractionation and Delastelle Systems

Lesson 18

Ledge Introduction to cryptarithms III

Lesson 19

Passwords, Privacy, Data Protection

Lesson 20

Codes

Lesson 21

Cryptanalysis of the Navy CSP 1500 Cipher Machine
[Hagelin C-38 Family]

Lesson 22

Herber's "Commercial Portable Code" Machine and the Electronic Cipher Machine Mark II (ECM Mark II or Sigaba)

Lesson 23

Data Encryption Standard (DES)

Lesson 24

Special topics. Course notes.

References

References
[Home]|[Start] 1