Message Encryption

line4

Appendix 6 – Message Encryption

 

Use the information in these web links to develop your message encryption methods. Remember, these methods are for keeping information out of the hands of your potential enemies that do not have sophisticated means of decrypting your messages.

http://www.exploratorium.edu/ronh/secret/secret.html

http://www.mountvernon.org/george-washington/the-revolutionary-war/spying-and-espionage/spy-techniques-of-the-revolutionary-war

http://www.mountvernon.org/george-washington/the-revolutionary-war/spying-and-espionage/the-culper-code-book

https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture2.pdf