1. 20
  1.  

  2. 6
    1. 3

      Interesting read. Not a particularly practical attack, since you need to be able to encrypt arbitrary messages (which for a pen-and-paper cypher implies you have the key), but they point out that the susceptibility to this slide attack suggests there are probably other more practical attacks without that requirement.