Return to Article Details Method of cryptologic data transformations Download Download PDF