This preview shows page 1. Sign up to view the full content.
Unformatted text preview: Next we took a look at the substitution cipher and the Vigenere cipher which are both presented in the text. We will deal with these in more detail when looking at their how to cryptanalyze them. Finally, the Hill cipher was introduced. Inherent in making this work is the idea of inverting a matrix (mod n). For the most part, we went through the process of inverting such a matrix. We also briefly showed how to encrypt data through matrix multiplication, given the key for the Hill cipher....
View Full Document
- Summer '09