Although traffic analysis, tempest attacks, viruses and Trojan horses are all useful techniques for gathering information, cryptanalysts realize that their real goal is to find a way of cracking the RSA cipher, the cornerstone of modern encryption. The RSA cipher is used to protect the most important military, diplomatic, commercial and criminal communications – exactly the messages that intelligence gathering organizations want to decipher.
—The Code Book,
Simon Singh
How is information presented in this passage?
Information is revealed chronologically.
Information is organized around the central idea that the RSA cipher is extremely strong.
The text uses vivid descriptions with a storytelling style to explain events.