ABSTRACT

Espionage and counter-espionage provides some excellent (and very interesting!) examples of the basic methods of encryption and how codes can be 'broken' by various means. One of the most common systems during the 20th century uses five-digit Code Groups.