Loading [MathJax]/extensions/mml2jax.js
Skip to main content
Library homepage
 

Text Color

Text Size

 

Margin Size

 

Font Type

Enable Dyslexic Font
Mathematics LibreTexts

Search

  • Filter Results
  • Location
  • Classification
    • Article type
    • Stage
    • Author
    • Embed Hypothes.is?
    • Cover Page
    • License
    • Show Page TOC
    • Transcluded
    • PrintOptions
    • OER program or Publisher
    • Autonumber Section Headings
    • License Version
    • Print CSS
    • Screen CSS
  • Include attachments
Searching in
About 3 results
  • https://math.libretexts.org/Courses/Las_Positas_College/Math_for_Liberal_Arts/06%3A_Cryptography/6.02%3A_Substitution_Ciphers
    In the case of a shift cipher, the method is “a shift cipher is used.” The encryption key is the specific amount of shift used. By choosing a random mapping, we could get a more secure cipher, with th...In the case of a shift cipher, the method is “a shift cipher is used.” The encryption key is the specific amount of shift used. By choosing a random mapping, we could get a more secure cipher, with the tradeoff that the encryption key is harder to describe; the key would now be the entire mapping, rather than just the shift amount. Because of the high frequency of the letter S in the encrypted text, it is very likely that the substitution maps E to S.
  • https://math.libretexts.org/Bookshelves/Applied_Mathematics/Math_in_Society_(Lippman)/16%3A_Cryptography/16.02%3A_Substitution_Ciphers
    In the case of a shift cipher, the method is “a shift cipher is used.” The encryption key is the specific amount of shift used. By choosing a random mapping, we could get a more secure cipher, with th...In the case of a shift cipher, the method is “a shift cipher is used.” The encryption key is the specific amount of shift used. By choosing a random mapping, we could get a more secure cipher, with the tradeoff that the encryption key is harder to describe; the key would now be the entire mapping, rather than just the shift amount. Because of the high frequency of the letter S in the encrypted text, it is very likely that the substitution maps E to S.
  • https://math.libretexts.org/Courses/SUNY_Schenectady_County_Community_College/Professor_Holz'_Topics_in_Contemporary_Mathematics/03%3A_Number_Bases_and_Modular_Arithmetic/3.05%3A_Cryptography/3.5.02%3A_Substitution_Ciphers
    In the case of a shift cipher, the method is “a shift cipher is used.” The encryption key is the specific amount of shift used. By choosing a random mapping, we could get a more secure cipher, with th...In the case of a shift cipher, the method is “a shift cipher is used.” The encryption key is the specific amount of shift used. By choosing a random mapping, we could get a more secure cipher, with the tradeoff that the encryption key is harder to describe; the key would now be the entire mapping, rather than just the shift amount. Because of the high frequency of the letter S in the encrypted text, it is very likely that the substitution maps E to S.

Support Center

How can we help?