Breaking ciphers was one of my hobbies growing up the 60's. I wasn't particularly good at it, but I understood the methods used--I read everything I could find on the subject that was available in the open literature. See the bibliography below if you'd like to try some interesting cryptography on paper and pencil methods.<p>In graduate school I studied CS and I proposed to my Ph.D. advisor that I would like to do research into cryptography (this was 1983) and he told me that all the interesting things about cryptography have already been discovered and that I should work on something else.<p>In 1983 Byte magazine, volume 3, an article proposed using a program based on the <i>Bazeries Cylinder</i>, see [6, 7], to obtain a practically unbreakable cipher. I didn't own a personal computer at the time, so as soon as I could get together with my best friend, a fellow grad student that owned a PC, we were able to break the cipher in just one evening. (Unfortunately, we were the second to do so and missing out on the $10 prize for the first person that broke the cipher.)<p>There are paper and pencil ciphers that are well designed and are much stronger than the Zodiac Killer's ciphers as I understand them. One designed for Soviet spies, known as the VIC cipher, resisted US cryptographers (as far as I know) and is explained in an interesting Scientific American in the July 1966 edition, see [7]. See also [8].<p>* Pre-computer age cryptography<p>[1] Helen Fouché Gaines, Cryptanalysis,
<a href="https://archive.org/details/cryptanalysis00hele" rel="nofollow">https://archive.org/details/cryptanalysis00hele</a><p>[2] William F. Friedman, Riverbank Publications,
<a href="https://en.wikipedia.org/wiki/Riverbank_Publications" rel="nofollow">https://en.wikipedia.org/wiki/Riverbank_Publications</a><p>[3] William F. Friedman, The Friedman Lectures on Cryptography,
<a href="https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/friedman-documents/publications/ACC15281/41785109082412.pdf" rel="nofollow">https://www.nsa.gov/Portals/70/documents/news-features/decla...</a><p>* Interesting historical information, there are so many to choose from now but two of my favorites (one old and one more recent)<p>[4] David Kahn, The Code Breakers, <a href="https://en.wikipedia.org/wiki/The_Codebreakers" rel="nofollow">https://en.wikipedia.org/wiki/The_Codebreakers</a><p>[5] Leo Marks, Between Silk and Cyanide: a Codemaker's Story 1941-1945 (this is less about cryptography and more about the practical problems of secret code and ciphers during WWII).<p>* The Thomas Jefferson wheel cipher or Bazeries Cylinder<p>[6] <a href="https://en.wikipedia.org/wiki/Jefferson_disk" rel="nofollow">https://en.wikipedia.org/wiki/Jefferson_disk</a><p>[7] <a href="https://archive.org/details/eu_BYTE-1983-03_OCR/page/n3/mode/2up?q=Bazeries" rel="nofollow">https://archive.org/details/eu_BYTE-1983-03_OCR/page/n3/mode...</a><p>* The (once) unbreakable VIC cipher<p>[7] David Kahn, Sci American, Vol 215, No 1 (July 1966), pp 38--47.<p>[8] <a href="https://en.wikipedia.org/wiki/VIC_cipher" rel="nofollow">https://en.wikipedia.org/wiki/VIC_cipher</a>