Cryptography Reference
In-Depth Information
[2] Charles P. Pfleeger. Security in Computing, 2nd ed. (Prentice-Hall, Upper Saddle River, NJ, 2000).
[3] William Shakespeare. The Complete Works of William Shakespeare. (Project Gutenberg, 1994); ht-
tp://www.gutenberg.org .
[4] Simon Singh. The Code Book. (Anchor, New York, 2000).
[5] Jeff Thompson. Monoalphabetic cryptanalysis. Phrack Magazine, 51 (September 1997);
www.phrack.org/issues.html?issue=51 .
Notes
1 A computer program could easily try every value of the key and analyze each decrypted text to see if it
makes sense in the language, for example, by dictionary lookups. This method would also work on any oth-
er small key space, such as monoalphabetic shift ciphers.
 
Search WWH ::




Custom Search