Engineering Cryptosystems
  • 1: Symmetric Encryption
  • 2: Using Symmetric Encryption
  • 3: Public-Key Protocols
  • 4: Cryptographic Future

Jefferson's Wheel and Perfect Ciphers

There are, of course, better ways to break a message encrypted using Jefferson's Wheel cipher than just trying all possible keys as in a brute force attack. Here's how Geoff Stoker solved it: Jefferson Wheel Challenge solved!.
Wolfram Alpha Search

Continue to Cryptanalysis


David Evans
University of Virginia

Site built using Pelican. Theme uses Bootstrap, and Font-Awesome.