There are, it seems to me, only three kinds of cryptology systems known:
These methods originated in Homer's day -right along with the rules for breaking them. As a result they're the least secure of the publically known methods - and, in fact, I've long thought that they can all be bypassed using the same approach: figure out where the message you have would be in an index produced by encoding all possible messages of some fixed length (chosen as an integer multiple of expected key length) according to all possible keys - then work backwards.
Notice that the current process, in which faster computers beget disproportionally longer keys, is ultimately self-limiting for the "near term" reason that errors are proportional to message length and the possible (but not proven) longer term reason that some combinatorial factoring strategies now considered impractical produce sub-linear growth in memory requirements and operations as key size increases.
(But, FYI, "near term" means growth from hundreds of bits to millions and current processors would, on average, take more than expected lifetime of the universe to factor a 1,000 digit product of two primes by one of today's combinatorial methods)
This is true because there is no known mathematical basis or formal recipe for this sentence.
Absent external clues, natural languages are not generally susceptible to any known decoding strategy other than those which start with a "rossetta phrase" - the same message in a language we know and in the one we don't.
What makes all this stuff interesting today, however, is that all forms of the same message, whether massaged by sleight of character, provable transform, or whatever mechanism in the human brain generates language, contain the same information - and major breakthroughs in natural language analysis should therefore spell the end of cryptology.
Why? because a star trek style universal translator would presumably take more than one input to hear 2.484564472E24 as "hello World", but would set aside all present efforts to use cryptology as a privacy barrier - making everything on the internet as presently structured directly available to anyone with the software.