Completion requirements
View
This material reviews topics covered so far and emphasizes the importance of the substitution operation within cryptographic systems. By itself, a substitution cipher is usually not that powerful. However, combining techniques from this section with the next two will give you a deeper understanding of how secure cryptographic systems are designed.
Source: Kansas State University Department of Computer Science, https://core.cs.ksu.edu/1-cc110/16-cryptography/01-intro/ This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.