The following is an article from volume 20 of the National Security Agency’s internal publication Cryptologic Quarterly.