Skip to main content

Appendix C Sage Cells Index

Chapter 2 Monoalphabetic Ciphers

Sage Computation 2.1.6 Cipher Wheel
Sage Computation 2.1.7 Brute Force Attack for Shift Ciphers
Sage Computation 2.9.6 Keyword Monoalphabetic Cipher
Sage Computation 2.10.8 Frequency Analysis for Monoalphabetic Cipher
Sage Computation 2.12.1 Shift Cipher
Sage Computation 2.12.2 Convert to Multiplicative Cipher
Sage Computation 2.12.3 A New Cipher Wheel
Sage Computation 2.12.4 Affine Cipher

Chapter 3 Vigenère Cipher

Sage Computation 3.4.6 Applying the Kasiski Test
Sage Computation 3.4.14 Applying the Kasiski and Friedman Tests
Sage Computation 3.4.17 Finding the first letter of the keyword
Sage Computation 3.4.19 Finding each letter of the keyword
Sage Computation 3.4.20 Decrypting Vigenére with keyword
Sage Computation 3.4.21 Combined Code for Vigenére Cryptanalysis
Sage Computation 3.6.1 Computing the Index of Coincidence

Chapter 4 The Enigma Machine

Sage Computation 4.2.10 Mini Enigma Simulator
Sage Computation 4.4.2 Paper Enigma Simulator

Chapter 5 Public Key Cryptography

Sage Computation 5.1.3 MatheMagic Trick 1
Sage Computation 5.11.1 Computing Discrete Logs
Sage Computation 5.11.2 Power Patterns
Sage Computation 5.11.3 Inverse Mod n

Chapter 6 Block Ciphers

Sage Computation 6.1.2 Playfair Cipher
Sage Computation 6.3.2 Hill Cipher