Toggle navigation
Ahazu.com
Home
Blog
Documents
Cryptography
Vulnerabilities
AD&D Stuff
Links
Classical Cryptography Course by LANAKI
Index:
Lesson 1: Simple Substitution
Lesson 2: Substitutions With Variants
Lesson 3: Substitutions With Variants Part II: Multiliteral Substitution
Lesson 4: Substitutions With Variants Part III: Multiliteral Substitution
Lesson 5: Xenocrypt Morphology
Lesson 6: Xenocrypt Morphology Part II
Lesson 7: Xenocrypt Morphology Part III
Lesson 8: Introduction To Cryptarithms And Hill Cipher
Lesson 9: German Reduction Ciphers: Enigma In Historical And Modern Times
Lesson 10:
Polyalphabetic Substitution Systems I
Viggy's Family And Quagmires I - IV
Applications Of The Principals Of Symmetry
Lesson 11:
Polyalphabetic Substitution Systems II
Cryptanalysis Of Viggy's Family
Lesson 12:
Polyalphabetic Substitution Systems III
Cryptanalysis Of Viggy's Extended Family
Decimation In Detail
Lesson 13:
Aperiodic Systems
Improving Cryptographic Security In Polyalphabetic Systems
Lesson 14: Ledge's Introduction To Cryptarithms II
Lesson 15: Statistical Attacks
Lesson 16: Transposition
Lesson 17:
Headline Puzzles, Playfair, Foursquare
Fractination And Delastelle Systems
Lesson 18: Ledge's Introduction To Cryptarithms III
Lesson 19: Passwords, Privacy, Data Protection
Lesson 20: Codes
Lesson 21: Cryptanalysis Of The Navy CSP 1500 Cipher Machine [Hagelin C-38 Family]
Lesson 22: Cipher Machines II
Lesson 23: Data Encryption Standard (DES)
Lesson 24: Special Topics
Annotated Cryptographic Resources And References