ABSTRACT

Monoalphabetic Substitution ..............................................................................75 Generating a Monoalphabetic Cipher Alphabet...........................................76 Extending the Functionality of the Monoalphabetic Cipher Program .......79 Monoalphabetic Decryption...........................................................................90 Keyword-Based Monoalphabetic Substitution ..............................................94 Transposition-Based Monoalphabetic Substitution.......................................95 Frequency Counting .....................................................................................103

Polyalphabetic Substitution ..............................................................................105 Commercial Encryption Standards...................................................................112