How do you crack a transposition cipher?
Run first-order statistics on it and you will find them to be identical to the frequency distributions of the language.
How do you crack a simple substitution cipher?
Look at the letter frequency distribution. If the frequency distribution looks the same as that of regular English, except you just have to rename all the letters (i.e. it is isomorphic), then you know you have a simple substitution cipher.
What is a Playfair cipher?

What is a homophonic substitution cipher?
What are cryptographic codes?
What is a polyalphabetic substitution cipher?
A **polyalphabetic substitution cipher** uses different substitution mappings (called multiple alphabets) on various portions of the plaintext.
How does a simple Vigenere cipher work?

What is a running-key Vigenere cipher?
The running-key Vigenere cipher uses a key that is the same length as the entire plaintext message, (making it invulnerable to the Kasiski Method, or other attacks that try to determine the block size).
What is a rotor and how does it work?
Define unicity distance.
The unicity distance of a cipher is the minimum amount of ciphertext (in number of characters) required to allow a
computationally unlimited adversary to recover the unique encryption key.
What is the random cipher model?
How do you crack a polyalphabetic substitution cipher?
Figure out the period t (i.e. the block size), and then just treat it like you’re cracking a monoalphabetic substitution cipher for each of the ciphers. That is, for each index of the block, compare the letters with language statistics to determine what the ciphertext letters map to.
Describe how the Method of Kasiski works.
Describe how the index of coincidences auto-correlation method works.