1 Ch. 2 Classical Encryption Techniques. 2 Contents Symmetric Cipher Model Substitution Techniques Transposition Techniques Rotor Machines Steganography.
Information Security and Management 2. Classical Encryption Techniques Chih-Hung Wang Fall 2011 1.