REFERENCES

W. F. FRIEDMAN, The Incidence of Coincidence, Riverbank Publications #22, 1920, reprinted by Aegean Part Press (Laguna Hills, California), 1996.

J. E. HAYNES and H. KLEHR, Venona: Decoding Soviet Espionage in America, Yale University Press (New Haven), 1990.

D. KAHN, Kahn on Codes, Macmillan (New York), 1983.

B. TUCKERMAN, “A Study of the Vigenère Vernam Single and Multiple Loop Enciphering Systems”, IBM Research Report, RC 2879, May 14, 1970.

P. WRIGHT, The Spy Catcher, Dell Books (New York), 1987.

1ASCII plaintext in this chapter will be enciphered after

• First replacing all lower-case letters by their corresponding upper-case letters, and

• Deleting all other ASCII characters.

2To increase the number of letters that can be coded with five 0's and 1's, typewriter keyboard was shifted up ↑ to change from letters to numbers and shifted down ↓ to change from numbers to letters.

3A Bernoulli process is often described as white noise.

Computer Security and Cryptography. By Alan G. KonheimCopyright © 2007 John Wiley & Sons, Inc.

Get Computer Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.