3.3 Why is it not practical to use an arbitrary reversible substitution cipher of the kind shown in Table 3.1?
 
 
View Solution
 
 
 
<< Back Next >>