Chapter 7 overview
Cryptography and Encryptions,Network Security,Caesar Cipher
Secure communication Informatics for economists II Jan Přichystal [email protected].
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.