TABLE OF CONTENTS
The Automated Cryptanalysis of Substitution Ciphers
John M. Carroll and Steve Martin 193
[An AI-influenced alternative to Peleg and Rosenfeld.]
The Voynich Manuscript - By Voynich? Michael Barlow 210
Foiling the Known Plaintext Attack Frank Rubin 217
[Against DES and LSFRs by random homophonic "pre-"encryption.]
Undergraduate Paper Competition in Cryptology
The 1986 Winner and the 1987 Competition 223
[And the winner is... "Equivalence Classes: Towards More Efficient
Search" by Samuel L. Levitin; or, how to break UNIX >crypt< faster!
To appear in January's issue.]
Free IBM-PC Encryption Software 224
[Based on "Linear Transformations in Galois Fields", >Cryptologia<,
Volume 4, Number 3, July 1980.]
Cadbury Code Confidential 225
[How >do< they get the caramel into those Caramilk bars?]
A Link With Pearl Harbour? Book Review Ralph Erskine 227
[>The Price of Admiralty: The War Diary of the German Naval Attache
in Japan, 1939-1943<.]
Geheimschreiber Wolfgang Mache 230
Cryptology and the Law - VII Louis Kruh 248
[The Invention Secrecy Act of 1951, 35 USC 181-188.]
Biographies of Contributors 254
Index by Author - Volume 10 (1986) CRYPTOLOGIA 255
________________________________________________________________________
Published Quarterly at Rose-Hulman Institute of Technology, Terre Haute,
Indiana, USA, 47803. $28.00 per year US, $36.00US per year non-US.
--
Richard Outerbridge <ou...@utcsri.UUCP> (416) 961-4757
Payload Deliveries: N 43 39'36", W 79 23'42", Elev. 106.47m.