198:
T U V W X Y Z A B C D F G H I J K L M N O P Q R S T U V W X Y Z A B C D E G H I J K L M N O P Q R S T U V W X Y Z A B C D E F H I J K L M N O P Q R S T U V W X Y Z A B C D E F G I J K L M N O P Q R S T U V W X Y Z A B C D E F G H J K L M N O P Q R S T U V W X Y Z A B C D E F G H I K L M N O P Q R S T U V W X Y Z A B C D E F G H I J L M N O P Q R S T U V W X Y Z A B C D E F G H I J K M N O P Q R S T U V W X Y Z A B C D E F G H I J K L N O P Q R S T U V W X Y Z A B C D E F G H I J K L M O P Q R S T U V W X Y Z A B C D E F G H I J K L M N P Q R S T U V W X Y Z A B C D E F G H I J K L M N O Q R S T U V W X Y Z A B C D E F G H I J K L M N O P R S T U V W X Y Z A B C D E F G H I J K L M N O P Q S T U V W X Y Z A B C D E F G H I J K L M N O P Q R T U V W X Y Z A B C D E F G H I J K L M N O P Q R S U V W X Y Z A B C D E F G H I J K L M N O P Q R S T V W X Y Z A B C D E F G H I J K L M N O P Q R S T U W X Y Z A B C D E F G H I J K L M N O P Q R S T U V X Y Z A B C D E F G H I J K L M N O P Q R S T U V W Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
25:
1475:
381:
THAT, IF DETHE COMES, IF ORDINARY MEN FEAR IT, IT FRIGHTS NOT YOU, ACCOUNTING IT FOR A HIGH HONOUR, TO HAVE SUCH A REWARDE OF YOUR LOYALTY. PRAY YET YOU MAY BE SPARED THIS SOE BITTER, CUP. I FEAR NOT THAT YOU WILL GRUDGE ANY SUFFERINGS; ONLY IF BIE SUBMISSIONS YOU CAN TURN THEM AWAY, TIS THE PART OF A WISE MAN. TELL ME, AN IF YOU CAN, TO DO FOR YOU ANYTHINGE THAT YOU WOLDE HAVE DONE. THE GENERAL GOES BACK ON WEDNESDAY. RESTINGE YOUR SERVANT TO COMMAND.
152:. To encrypt a message with the Caesar cipher, each letter of message is replaced by the letter three positions later in the alphabet. Hence, A is replaced by D, B by E, C by F, etc. Finally, X, Y and Z are replaced by A, B and C respectively. So, for example, "WIKIPEDIA" encrypts as "ZLNLSHGLD". Caesar rotated the alphabet by three letters, but any number works.
187:, where multiple cipher alphabets are used. The encoder would make up two or more cipher alphabets using whatever techniques they choose, and then encode their message, alternating what cipher alphabet is used with every letter or word. This makes the message much harder to decode because the codebreaker would have to figure out both cipher alphabets.
446:. For these ciphers an attacker should not be able to find the key even if they know any amount of plaintext and corresponding ciphertext and even if they could select plaintext or ciphertext themselves. Classical ciphers do not satisfy these much stronger criteria and hence are no longer of interest for serious applications.
197:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M N O P Q R S T U V W X Y Z A B D E F G H I J K L M N O P Q R S T U V W X Y Z A B C E F G H I J K L M N O P Q R S
285:
In a transposition cipher, the letters themselves are kept unchanged, but their order within the message is scrambled according to some well-defined scheme. Many transposition ciphers are done according to a geometric design. A simple (and once again easy to crack) encryption would be to write every
380:
WORTHIE SIR JOHN, HOPE, THAT IS YE BESTE COMFORT OF YE AFFLICTED, CANNOT MUCH, I FEAR ME, HELP YOU NOW. THAT I WOULD SAY TO YOU, IS THIS ONLY: IF EVER I MAY BE ABLE TO REQUITE THAT I DO OWE YOU, STAND NOT UPON ASKING ME. TIS NOT MUCH THAT I CAN DO; BUT WHAT I CAN DO, BEE YE VERY SURE I WILL. I KNOW
293:
In a columnar cipher, the original message is arranged in a rectangle, from left to right and top to bottom. Next, a key is chosen and used to assign a number to each column in the rectangle to determine the order of rearrangement. The number corresponding to the letters in the key is determined by
155:
Another method of substitution cipher is based on a keyword. All spaces and repeated letters are removed from a word or phrase, which the encoder then uses as the start of the cipher alphabet. The end of the cipher alphabet is the rest of the alphabet in order without repeating the letters in the
93:
that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. However, they are also usually very simple to break with modern technology. The term includes the simple
205:
is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For
318:
Many transposition ciphers are similar to these two examples, usually involving rearranging the letters into rows or columns and then taking them in a systematic way to transpose the letters. Other examples include the
Vertical Parallel and the Double Transposition Cipher.
194:, an innovative encoding method. With the square, there are 26 different cipher alphabets that are used to encrypt text. Each cipher alphabet is just another rightward Caesar shift of the original alphabet. This is what a Vigenère square looks like:
360:
words with nulls placed in designated areas or even a plaintext message broken up in different positions with a null at the end of each word. However, a message with only a couple nulls (for example, one at the beginning and one at the end) is
300:
Next, the letters are taken in numerical order and that is how the message is transposed. The column under A is taken first, then the column under C, then the column under T, as a result the message "The sky is blue" has become: HKSUTSILEYBE
262:
alphabet, where signs of the zodiac were used to represent different letters, for example, the symbols for the sun stood for A, Jupiter stood for B, and Saturn stood for C. Dots, lines, or dashes could also be used, one example of this being
304:
In the
Chinese cipher's method of transposing, the letters of the message are written from right to left, down and up columns to scramble the letters. Then, starting in the first row, the letters are taken in order to get the new
642:
434:
On the other hand, modern ciphers are designed to withstand much stronger attacks than ciphertext-only attacks. A good modern cipher must be secure against a wide range of potential attacks including
388:
A dot or pinprick null cipher is a common classical encryption method in which dot or pinprick is placed above or below certain letters in a piece of writing. An early reference to this was when
255:, where numbers were used to represent syllables. There is also another number substitution cipher that involves having four different number pair options for a letter based on a keyword.
403:
Classical ciphers are commonly quite easy to break. Many of the classical ciphers can be broken even if the attacker only knows sufficient ciphertext and hence they are susceptible to a
271:
uses a grid system or lines and dots to establish symbols for letters. There are various other methods that involve substituting letters of the alphabet with symbols or dots and dashes.
655:
294:
their place in the alphabet, i.e. A is 1, B is 2, C is 3, etc. For example, if the key word is CAT and the message is THE SKY IS BLUE, the message would be arranged thus:
201:
To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If
297:
C A T 3 1 20 T H E S K Y I S B L U E
1455:
1285:
145:
In a substitution cipher, letters, or groups of letters, are systematically replaced throughout the message for other letters, groups of letters, or symbols.
423:, because for example frequent letters in the plaintext language correspond to frequent letters in the ciphertexts. Polyalphabetic ciphers such as the
183:
The previous examples were all examples of monoalphabetic substitution ciphers, where just one cipher alphabet is used. It is also possible to have a
697:
1123:
690:
1116:
564:
539:
514:
68:
46:
913:
309:. For example, if the message needed to be enciphered was THE DOG RAN FAR, the Chinese cipher would look like this:
39:
427:
prevent a simple frequency analysis by using multiple substitutions. However, more advanced techniques such as the
94:
systems used since Greek and Roman times, the elaborate
Renaissance ciphers, World War II cryptography such as the
903:
683:
908:
635:
Information about many different types of encryption algorithms including substitution and transposition ciphers
1334:
1265:
580:
1109:
454:
1450:
1405:
1208:
490:
Travis, Falcon; Hindley, Judy; Thomson, Ruth; Amery, Heather; Rawson, Christopher; Harper, Anita (1978).
923:
1503:
1329:
1445:
258:
Instead of numbers, symbols can also be used to replace letters or syllables. One example of this is
190:
Another example of a polyalphabetic substitution cipher that is much more difficult to decode is the
1435:
1425:
1280:
443:
335:
33:
449:
Some techniques from classical ciphers can be used to strengthen modern ciphers. For example, the
1430:
1420:
1213:
1173:
1166:
1151:
1146:
626:
470:
439:
286:
word backwards. For example, "Hello my name is Alice." would now be "olleH ym eman si ecilA." A
1218:
1161:
435:
404:
50:
251:
Some substitution ciphers involve using numbers instead of letters. An example of this is the
1478:
1324:
1270:
1034:
725:
184:
959:
1440:
1364:
1065:
969:
895:
416:
280:
115:
156:
keyword. For example, if the keyword is CIPHER, the cipher alphabet would look like this:
8:
1193:
1084:
1079:
993:
827:
656:
American Army Field Codes In the
American Expeditionary Forces During The First World War
605:
450:
428:
140:
121:
102:
661:
Laffin, John. Codes and
Ciphers: Secret Writing through the Ages. Abelard-Schuman, 1964.
1309:
1293:
1235:
1060:
979:
885:
817:
420:
412:
748:
424:
385:
The third letter after each punctuation reveals "Panel at East end of Chapel slides".
1369:
1359:
1225:
1029:
949:
918:
812:
743:
560:
535:
510:
369:
664:
Wrixon, Fred B. Codes, Ciphers, and Secret
Languages. New York: Bonanza Books, 1989.
352:
Put simply, a concealment, or null, cipher is any cipher which involves a number of
1304:
651:
850:
807:
776:
758:
632:
389:
191:
643:
The Code Book: The
Science of Secrecy from Ancient Egypt to Quantum Cryptography
1379:
1299:
1255:
1198:
1183:
1069:
964:
845:
738:
733:
327:
95:
312:
R R G T A A O H F N D E
267:, which is not a cipher, but uses dots and dashes as letters nonetheless. The
1497:
1460:
1415:
1374:
1354:
1245:
1203:
1178:
1021:
875:
855:
835:
786:
766:
408:
372:
Royalist Sir John
Trevanian was aided in his escape from a Puritan castle in
268:
149:
1410:
1250:
1240:
1230:
1188:
1132:
954:
865:
771:
638:
331:
252:
82:
1389:
1039:
1006:
1001:
870:
458:
347:
127:
1349:
1319:
1314:
1275:
1073:
1055:
860:
791:
633:
Trinity
College Department of Computer Science: Historical Cryptography
373:
306:
264:
1339:
1011:
357:
323:
1384:
1344:
781:
338:
iterate through several stages of substitution and transposition.
105:
relies on new algorithms and computers developed since the 1970s.
287:
1260:
974:
840:
714:
259:
90:
944:
939:
880:
411:) have a small key space. These ciphers can be broken with a
557:
Top Secret: a
Handbook of Codes, Ciphers, and Secret Writing
532:
Top Secret: a Handbook of Codes, Ciphers, and Secret Writing
326:
can be formed by mixing substitution and transposition in a
648:
D'Agapeyeff, Alexander. Codes and Ciphers. Oxford UP, 1939.
629:
Pencil-and-paper ciphers on Ciphermachines & Cryptology
419:
can have a large key space, but are often susceptible to a
606:"Understanding AES Mix-Columns Transformation Calculation"
489:
290:
is a machine that aids in the transposition of methods.
1286:
Cryptographically secure pseudorandom number generator
398:
148:
A well-known example of a substitution cipher is the
667:
176:
c i p h e r a b d f g j k l m n o q s t u v w x y z
166:
a b c d e f g h i j k l m n o p q r s t u v w x y z
1495:
507:Explorer Academy Codebreaking Activity Adventure
1117:
691:
108:
581:"Aeneas Tacticus • Siege Defense, XXI‑XXXI"
315:The cipher text then reads: RRGT AAOH FNDE
1124:
1110:
705:
698:
684:
431:can still be used to break these ciphers.
415:, that is by simply trying out all keys.
356:or decoy letters. A null cipher could be
113:Classical ciphers are often divided into
69:Learn how and when to remove this message
16:Disused cipher that was used historically
554:
529:
274:
32:This article includes a list of general
134:
1496:
341:
1105:
679:
504:
407:. Some classical ciphers (e.g., the
18:
603:
13:
548:
399:Cryptanalysis of classical ciphers
185:polyalphabetic substitution cipher
38:it lacks sufficient corresponding
14:
1515:
573:
523:
483:
394:On the Defense of Fortifications.
1474:
1473:
1131:
658:, U.S. War Department, June 1942
23:
1335:Information-theoretic security
597:
498:
1:
509:. National Geographic Books.
476:
210:and the message to encode is
7:
1451:Message authentication code
1406:Cryptographic hash function
1209:Cryptographic hash function
464:
392:wrote about it in his book
206:example, if the keyword is
10:
1520:
1330:Harvest now, decrypt later
555:Janeczko, Paul B. (2004).
530:Janeczko, Paul B. (2004).
345:
278:
138:
109:Types of classical ciphers
1469:
1446:Post-quantum cryptography
1398:
1139:
1101:
1048:
1020:
992:
932:
894:
826:
800:
757:
724:
713:
675:
671:
645:. New York: Anchor, 2000.
444:chosen-ciphertext attacks
1436:Quantum key distribution
1426:Authenticated encryption
1281:Random number generation
440:chosen-plaintext attacks
214:, then the encoding is:
1431:Public-key cryptography
1421:Symmetric-key algorithm
1214:Key derivation function
1174:Cryptographic primitive
1167:Authentication protocol
1152:Outline of cryptography
1147:History of cryptography
471:History of cryptography
436:known-plaintext attacks
53:more precise citations.
1219:Secure Hash Algorithms
1162:Cryptographic protocol
707:Classical cryptography
505:Moore, Gareth (2019).
494:. Usborne Pocketbooks.
405:ciphertext-only attack
383:
1325:End-to-end encryption
1271:Cryptojacking malware
585:penelope.uchicago.edu
378:
275:Transposition ciphers
125:, but there are also
116:transposition ciphers
1441:Quantum cryptography
1365:Trusted timestamping
1066:Index of coincidence
970:Reservehandverfahren
559:. Candlewick Press.
534:. Candlewick Press.
417:Substitution ciphers
368:For example, during
281:Transposition cipher
135:Substitution ciphers
122:substitution ciphers
101:In contrast, modern
1194:Cryptographic nonce
1085:Kasiski examination
1080:Information leakage
604:Xintong, Kit Choy.
492:The Spy's Guidebook
429:Kasiski examination
370:England's Civil War
342:Concealment ciphers
141:Substitution cipher
128:concealment ciphers
103:strong cryptography
1310:Subliminal channel
1294:Pseudorandom noise
1236:Key (cryptography)
1061:Frequency analysis
960:RasterschlĂĽssel 44
421:frequency analysis
413:brute force attack
1504:Classical ciphers
1491:
1490:
1487:
1486:
1370:Key-based routing
1360:Trapdoor function
1226:Digital signature
1097:
1096:
1093:
1092:
988:
987:
249:
248:
181:
180:
79:
78:
71:
1511:
1477:
1476:
1305:Insecure channel
1157:Classical cipher
1126:
1119:
1112:
1103:
1102:
722:
721:
700:
693:
686:
677:
676:
673:
672:
669:
668:
652:William Friedman
619:
618:
616:
615:
610:
601:
595:
594:
592:
591:
577:
571:
570:
552:
546:
545:
527:
521:
520:
502:
496:
495:
487:
376:by this message:
245:
235:
225:
217:
216:
213:
209:
204:
177:
172:cipher alphabet
167:
162:normal alphabet
159:
158:
87:classical cipher
74:
67:
63:
60:
54:
49:this article by
40:inline citations
27:
26:
19:
1519:
1518:
1514:
1513:
1512:
1510:
1509:
1508:
1494:
1493:
1492:
1483:
1465:
1394:
1135:
1130:
1089:
1044:
1016:
984:
928:
890:
822:
796:
759:Polybius square
753:
717:
709:
704:
623:
622:
613:
611:
608:
602:
598:
589:
587:
579:
578:
574:
567:
553:
549:
542:
528:
524:
517:
503:
499:
488:
484:
479:
467:
425:Vigenère cipher
401:
390:Aeneas Tacticus
365:a null cipher.
350:
344:
313:
298:
283:
277:
243:
233:
223:
211:
207:
202:
199:
192:Vigenère square
175:
165:
143:
137:
111:
75:
64:
58:
55:
45:Please help to
44:
28:
24:
17:
12:
11:
5:
1517:
1507:
1506:
1489:
1488:
1485:
1484:
1482:
1481:
1470:
1467:
1466:
1464:
1463:
1458:
1456:Random numbers
1453:
1448:
1443:
1438:
1433:
1428:
1423:
1418:
1413:
1408:
1402:
1400:
1396:
1395:
1393:
1392:
1387:
1382:
1380:Garlic routing
1377:
1372:
1367:
1362:
1357:
1352:
1347:
1342:
1337:
1332:
1327:
1322:
1317:
1312:
1307:
1302:
1300:Secure channel
1297:
1291:
1290:
1289:
1278:
1273:
1268:
1263:
1258:
1256:Key stretching
1253:
1248:
1243:
1238:
1233:
1228:
1223:
1222:
1221:
1216:
1211:
1201:
1199:Cryptovirology
1196:
1191:
1186:
1184:Cryptocurrency
1181:
1176:
1171:
1170:
1169:
1159:
1154:
1149:
1143:
1141:
1137:
1136:
1129:
1128:
1121:
1114:
1106:
1099:
1098:
1095:
1094:
1091:
1090:
1088:
1087:
1082:
1077:
1063:
1058:
1052:
1050:
1046:
1045:
1043:
1042:
1037:
1032:
1026:
1024:
1018:
1017:
1015:
1014:
1009:
1004:
998:
996:
990:
989:
986:
985:
983:
982:
977:
972:
967:
965:Reihenschieber
962:
957:
952:
947:
942:
936:
934:
930:
929:
927:
926:
921:
916:
911:
906:
900:
898:
892:
891:
889:
888:
883:
878:
873:
868:
863:
858:
853:
848:
843:
838:
832:
830:
824:
823:
821:
820:
815:
810:
804:
802:
798:
797:
795:
794:
789:
784:
779:
774:
769:
763:
761:
755:
754:
752:
751:
746:
741:
736:
730:
728:
726:Polyalphabetic
719:
711:
710:
703:
702:
695:
688:
680:
666:
665:
662:
659:
649:
646:
636:
630:
621:
620:
596:
572:
565:
547:
540:
522:
515:
497:
481:
480:
478:
475:
474:
473:
466:
463:
400:
397:
346:Main article:
343:
340:
328:product cipher
311:
296:
279:Main article:
276:
273:
247:
246:
241:
237:
236:
231:
227:
226:
221:
196:
179:
178:
173:
169:
168:
163:
139:Main article:
136:
133:
110:
107:
96:Enigma machine
77:
76:
31:
29:
22:
15:
9:
6:
4:
3:
2:
1516:
1505:
1502:
1501:
1499:
1480:
1472:
1471:
1468:
1462:
1461:Steganography
1459:
1457:
1454:
1452:
1449:
1447:
1444:
1442:
1439:
1437:
1434:
1432:
1429:
1427:
1424:
1422:
1419:
1417:
1416:Stream cipher
1414:
1412:
1409:
1407:
1404:
1403:
1401:
1397:
1391:
1388:
1386:
1383:
1381:
1378:
1376:
1375:Onion routing
1373:
1371:
1368:
1366:
1363:
1361:
1358:
1356:
1355:Shared secret
1353:
1351:
1348:
1346:
1343:
1341:
1338:
1336:
1333:
1331:
1328:
1326:
1323:
1321:
1318:
1316:
1313:
1311:
1308:
1306:
1303:
1301:
1298:
1295:
1292:
1287:
1284:
1283:
1282:
1279:
1277:
1274:
1272:
1269:
1267:
1264:
1262:
1259:
1257:
1254:
1252:
1249:
1247:
1246:Key generator
1244:
1242:
1239:
1237:
1234:
1232:
1229:
1227:
1224:
1220:
1217:
1215:
1212:
1210:
1207:
1206:
1205:
1204:Hash function
1202:
1200:
1197:
1195:
1192:
1190:
1187:
1185:
1182:
1180:
1179:Cryptanalysis
1177:
1175:
1172:
1168:
1165:
1164:
1163:
1160:
1158:
1155:
1153:
1150:
1148:
1145:
1144:
1142:
1138:
1134:
1127:
1122:
1120:
1115:
1113:
1108:
1107:
1104:
1100:
1086:
1083:
1081:
1078:
1075:
1071:
1067:
1064:
1062:
1059:
1057:
1054:
1053:
1051:
1049:Cryptanalysis
1047:
1041:
1038:
1036:
1033:
1031:
1028:
1027:
1025:
1023:
1022:Steganography
1019:
1013:
1010:
1008:
1005:
1003:
1000:
999:
997:
995:
991:
981:
978:
976:
973:
971:
968:
966:
963:
961:
958:
956:
953:
951:
948:
946:
943:
941:
938:
937:
935:
931:
925:
922:
920:
917:
915:
912:
910:
907:
905:
902:
901:
899:
897:
896:Transposition
893:
887:
884:
882:
879:
877:
874:
872:
869:
867:
864:
862:
859:
857:
854:
852:
849:
847:
844:
842:
839:
837:
834:
833:
831:
829:
825:
819:
816:
814:
811:
809:
806:
805:
803:
799:
793:
790:
788:
785:
783:
780:
778:
775:
773:
770:
768:
765:
764:
762:
760:
756:
750:
747:
745:
742:
740:
737:
735:
732:
731:
729:
727:
723:
720:
716:
712:
708:
701:
696:
694:
689:
687:
682:
681:
678:
674:
670:
663:
660:
657:
653:
650:
647:
644:
640:
637:
634:
631:
628:
625:
624:
607:
600:
586:
582:
576:
568:
566:9780763629724
562:
558:
551:
543:
541:9780763629724
537:
533:
526:
518:
516:9781426333071
512:
508:
501:
493:
486:
482:
472:
469:
468:
462:
460:
456:
452:
447:
445:
441:
437:
432:
430:
426:
422:
418:
414:
410:
409:Caesar cipher
406:
396:
395:
391:
386:
382:
377:
375:
371:
366:
364:
359:
355:
349:
339:
337:
333:
332:block ciphers
329:
325:
322:More complex
320:
316:
310:
308:
302:
295:
291:
289:
282:
272:
270:
269:pigpen cipher
266:
261:
256:
254:
242:
239:
238:
232:
229:
228:
222:
219:
218:
215:
195:
193:
188:
186:
174:
171:
170:
164:
161:
160:
157:
153:
151:
150:Caesar cipher
146:
142:
132:
130:
129:
124:
123:
118:
117:
106:
104:
99:
97:
92:
89:is a type of
88:
84:
73:
70:
62:
59:November 2010
52:
48:
42:
41:
35:
30:
21:
20:
1411:Block cipher
1251:Key schedule
1241:Key exchange
1231:Kleptography
1189:Cryptosystem
1156:
1133:Cryptography
955:One-time pad
828:Substitution
706:
639:Singh, Simon
627:Hand Ciphers
612:. Retrieved
599:
588:. Retrieved
584:
575:
556:
550:
531:
525:
506:
500:
491:
485:
448:
433:
402:
393:
387:
384:
379:
367:
362:
353:
351:
321:
317:
314:
303:
299:
292:
284:
257:
253:Great Cipher
250:
244:LXFOPVEFRNHR
234:LEMONLEMONLE
224:ATTACKATDAWN
212:ATTACKATDAWN
200:
189:
182:
154:
147:
144:
126:
120:
114:
112:
100:
98:and beyond.
86:
83:cryptography
80:
65:
56:
37:
1399:Mathematics
1390:Mix network
1007:Code talker
886:Running key
818:Four-square
459:Hill cipher
442:as well as
348:Null cipher
240:Ciphertext
51:introducing
1350:Ciphertext
1320:Decryption
1315:Encryption
1276:Ransomware
1056:Cryptogram
950:Kama Sutra
919:Rail fence
914:Myszkowski
861:Chaocipher
813:Two-square
792:VIC cipher
744:Trithemius
614:2016-10-26
590:2022-05-28
477:References
451:MixColumns
374:Colchester
324:algorithms
307:ciphertext
265:Morse Code
220:Plaintext
34:references
1340:Plaintext
980:Solitaire
718:by family
358:plaintext
330:; modern
1498:Category
1479:Category
1385:Kademlia
1345:Codetext
1288:(CSPRNG)
1266:Machines
1068:(Units:
904:Columnar
851:Beaufort
808:Playfair
782:Tap code
777:Nihilist
749:Vigenère
465:See also
453:step in
334:such as
1140:General
846:Autokey
734:Alberti
715:Ciphers
288:scytale
47:improve
1261:Keygen
1035:Grille
975:Slidex
909:Double
876:Pigpen
856:Caesar
841:Atbash
836:Affine
801:Square
787:Trifid
767:ADFGVX
739:Enigma
563:
538:
513:
354:nulls,
260:Zodiac
91:cipher
36:, but
1296:(PRN)
1030:Bacon
994:Codes
945:DRYAD
940:BATCO
933:Other
924:Route
881:ROT13
866:Great
772:Bifid
609:(PDF)
457:is a
208:LEMON
203:LEMON
1072:and
1040:Null
1012:Poem
1002:Book
871:Hill
561:ISBN
536:ISBN
511:ISBN
438:and
230:Key
119:and
85:, a
1074:Nat
1070:Ban
455:AES
363:not
336:DES
81:In
1500::
654:.
641:.
583:.
461:.
131:.
1125:e
1118:t
1111:v
1076:)
699:e
692:t
685:v
617:.
593:.
569:.
544:.
519:.
72:)
66:(
61:)
57:(
43:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.