Qsr Nrwn
Website
Classical
Cryptography
Course
by Lanaki
Started on September 27
th
1995
Revision 0
© 1995-2004, All Rights Reserved
Index
Volumes I & II
Index of Classical Cryptography Course
Lesson 1
Simple substitution
Lesson 2
Substitution with variants I
Lesson 3
Substitution with variants II
Lesson 4
Substitution with variants III
Lesson 5
Xenocrypt morphology I
Lesson 6
Xenocrypt morphology II
Lesson 7: Xenocrypt morphology III
Lesson 8
Ledge Introduction to cryptarithms I.
Hill Cipher
Lesson 9
German reduction ciphers. Enigma in historical and modern times
Lesson 10: Polyalphabetic substitution systems I.
Viggy's family and Quagmires I - IV.
Application of the principals of symmetry
Lesson 11: Polyalphabetic substitution systems II.
Cryptanalysis of Viggy's family.
Lesson 12: Polyalphabetic substitution systems III.
Cryptanalysis of Viggy's extended family.
Decimation in detail
Lesson 13: Aperiodic systems.
Improving cryptographic security in polyalphabetic systems.
Lesson 14: Ledge's introduction to cryptarithms II
Lesson 15: Statistical attacks
Lesson 16: Transposition
Lesson 17: Headline Puzzles, Playfair, Foursquare, Fractionation and Delastelle Systems
Lesson 18
Ledge Introduction to cryptarithms III
Lesson 19
Passwords, Privacy, Data Protection
Lesson 20
Codes
Lesson 21
Cryptanalysis of the Navy CSP 1500 Cipher Machine
[Hagelin C-38 Family]
Lesson 22
Herber's "Commercial Portable Code" Machine and the Electronic Cipher Machine Mark II (ECM Mark II or Sigaba)
Lesson 23
Data Encryption Standard (DES)
Lesson 24
Special topics. Course notes.
References
References
[Home]
|
[Start]
© 2004 Qsr Nrwn