Return to Article Details Effectiveness of Text Messages Using Substitution Ciphers and Transposition Ciphers Download Download PDF