• different types of substitution cipher. If the cipher operates on single letters, it is termed a simple substitution cipher; a cipher that operates on larger...
    30 KB (4,047 words) - 18:46, 28 October 2024
  • Thumbnail for Caesar cipher
    message, so the cipher is classed as a type of monoalphabetic substitution, as opposed to polyalphabetic substitution. The Caesar cipher is named after...
    19 KB (2,058 words) - 14:38, 20 October 2024
  • polyalphabetic cipher is a substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though...
    6 KB (732 words) - 20:12, 20 October 2024
  • Thumbnail for Playfair cipher
    Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher...
    20 KB (2,502 words) - 18:18, 12 September 2024
  • Thumbnail for Pigpen cipher
    Napoleon cipher, and tic-tac-toe cipher) is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid...
    10 KB (1,303 words) - 19:12, 18 November 2024
  • Thumbnail for Cipher
    ciphers used in the past are sometimes known as classical ciphers. They include simple substitution ciphers (such as ROT13) and transposition ciphers...
    17 KB (2,054 words) - 13:39, 20 November 2024
  • Thumbnail for Transposition cipher
    between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption...
    25 KB (3,604 words) - 15:23, 5 November 2024
  • Classical ciphers are often divided into transposition ciphers and substitution ciphers, but there are also concealment ciphers. In a substitution cipher, letters...
    15 KB (2,528 words) - 02:24, 15 June 2024
  • The Aristocrat Cipher is a type of monoalphabetic substitution cipher in which plaintext is replaced with ciphertext and encoded into assorted letters...
    12 KB (1,236 words) - 18:24, 18 October 2024
  • Thumbnail for Copiale cipher
    in Sweden, found the cipher to be an encrypted German text. The manuscript is a homophonic cipher that uses a complex substitution code, including symbols...
    9 KB (988 words) - 21:46, 3 June 2024
  • Thumbnail for Bacon's cipher
    than its content. Baconian ciphers are categorized as both a substitution cipher (in plain code) and a concealment cipher (using the two typefaces). To...
    8 KB (775 words) - 13:36, 18 October 2024
  • of ciphers known as polygraphic substitution ciphers. This adds significant strength to the encryption when compared with monographic substitution ciphers...
    11 KB (1,673 words) - 19:08, 29 June 2024
  • Thumbnail for Book cipher
    This method was used in the second Beale cipher. This variant is more properly called a substitution cipher, specifically a homophonic one. Both methods...
    14 KB (1,947 words) - 09:19, 9 November 2024
  • one of three categories of cipher used in classical cryptography along with substitution ciphers and transposition ciphers. In classical cryptography...
    11 KB (1,498 words) - 01:12, 19 November 2024
  • The affine cipher is a type of monoalphabetic substitution cipher, where each letter in an alphabet is mapped to its numeric equivalent, encrypted using...
    10 KB (1,144 words) - 15:28, 13 October 2024
  • Thumbnail for Hill cipher
    Hill cipher is a polygraphic substitution cipher based on linear algebra. Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which...
    13 KB (2,241 words) - 21:56, 17 October 2024
  • Thumbnail for Rotor machine
    advance positions, changing the substitution. By this means, a rotor machine produces a complex polyalphabetic substitution cipher, which changes with every...
    17 KB (2,460 words) - 12:53, 17 April 2024
  • Atbash (redirect from Atbash cipher)
    Atbash (Hebrew: אתבש; also transliterated Atbaš) is a monoalphabetic substitution cipher originally used to encrypt the Hebrew alphabet. It can be modified...
    7 KB (645 words) - 18:55, 28 October 2024
  • In classical cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide...
    10 KB (1,298 words) - 08:50, 11 November 2024
  • Thumbnail for Ciphertext
    Ciphertext (redirect from Cipher text)
    Caesar cipher and one-time pad) Polyalphabetic substitution cipher: a substitution cipher using multiple substitution alphabets (e.g., Vigenère cipher and...
    9 KB (1,139 words) - 23:45, 27 October 2024
  • The Beaufort cipher, created by Sir Francis Beaufort, is a substitution cipher similar to the Vigenère cipher, with a slightly modified enciphering mechanism...
    7 KB (839 words) - 17:57, 30 October 2024
  • Thumbnail for Frequency analysis
    potential to be exploited in a ciphertext-only attack. In a simple substitution cipher, each letter of the plaintext is replaced with another, and any particular...
    16 KB (1,663 words) - 06:05, 8 April 2024
  • cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks. Block ciphers are the elementary building...
    50 KB (6,504 words) - 19:44, 21 November 2024
  • Thumbnail for The Adventure of the Dancing Men
    provide him with an important clue—he realises that they form a substitution cipher and cracks the code by frequency analysis. The last of the messages...
    16 KB (1,907 words) - 09:25, 14 September 2024
  • Thumbnail for Substitution–permutation network
    cryptography, an SP-network, or substitution–permutation network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES...
    7 KB (958 words) - 22:10, 15 October 2024
  • resistant to cryptanalysis. The product cipher combines a sequence of simple transformations such as substitution (S-box), permutation (P-box), and modular...
    2 KB (278 words) - 23:01, 22 April 2023
  • Although ciphers can be confusion-only (substitution cipher, one-time pad) or diffusion-only (transposition cipher), any "reasonable" block cipher uses both...
    12 KB (1,496 words) - 18:05, 29 July 2024
  • Thumbnail for Enigma machine
    The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication...
    93 KB (11,252 words) - 11:26, 24 November 2024
  • Thumbnail for Vigenère cipher
    Vigenère cipher is therefore a special case of a polyalphabetic substitution. First described by Giovan Battista Bellaso in 1553, the cipher is easy to...
    45 KB (5,937 words) - 11:20, 17 November 2024
  • Thumbnail for Secret decoder ring
    (or secret decoder) is a device that allows one to decode a simple substitution cipher—or to encrypt a message by working in the opposite direction. As...
    5 KB (588 words) - 22:13, 23 October 2024