"This work will also be of interest to IT and Information Theory specialists as a contribution to mathematical theory of communication and for validation of the uniqueness of the successful cipher attack by evaluating mathematical adequacy of the data sets used (technically referred to as unicity distance)."