Re: how to break the shift cipher
From: Jim Gillogly (jim_at_acm.org)
Date: Mon, 05 Jul 2004 23:16:24 GMT
On Mon, 05 Jul 2004 16:17:15 +0200, Mok-Kong Shen wrote:
> Could one thus consider ADFGVX, whose output may after an
> appropriate transposition be recombined by another table to
> the original alphabet, to be a manual cipher of preference?
For what application and threat model? And for what level of
competence in your code clerk? There are always tradeoffs.