Breaking transpositon ciphers