ABSTRACT

In previous chapters I have often referred to the various crypto systems used by the Japanese. What were they like? What did they tell us? How were they sent? How were they intercepted? How were they broken? I shall try to answer these and similar questions in the next chapters.