John LoxtonThere are essentially only two operations involved in the encryption of a message: substitution and transposition.Click here to download the PDF file