Section outline

    • Cryptography?
    • Substitution Techniques
    • Transposition Techniques
    • Over-Encryption