Browse Items (13 total)

ADFGVX-cipher-army-German-World-War-I.jpg
The ADFGVX cipher was developed by Colonel Fritz Nebel and introduced in March 1918. Germany used it as a field cipher during WWI. It was named the ADFGVX cipher for the letters used to create ciphertext, chosen for their distinctiveness in morse…

9204085.jpg
The Affine Cipher is a form of substitution cipher that involves math. The shift of the alphabet- while transpositioning plaintext into ciphertext is determined by a mathematical equation. This equation is:

E(x) = (ax+b) mod m

E(x) = The…

634413_orig.jpg
The Atbash Cipher is a monoalphabetic substitution cipher that is relatively simple and does not require a key. Instead of a key, the substitution simply relies on reversing the alphabet. Therefore, 'A' becomes 'Z', 'B' becomes 'Y', and so forth.…

Caesar Cipher.png
The Caesar Cipher is one of the oldest ciphers, used by Julius Caesar to communicate with his generals. It works by shifting the alphabet down by a fixed number, or key. Due to the simplicity, it can be broken if the crypanalyst knows that a simple…

2020-04-26 05_28_04-Frequency Analysis_ Breaking the Code - Crypto Corner.jpg
Frequency Analysis is a method of code breaking that works to decipher all substitution ciphers. This methods relies on the fact that some letters of the alphabet are used more than other letters of the alphabet. For example, 'E' is more commonly…

2020-04-26 02_15_23-Hill Cipher - Crypto Corner.jpg
The Hill Cipher was developed in 1929 by Lester Hill. A digraph substitution cipher, it works using groups of letters to encrypt. However, it is different from other digraph substitution ciphers because it can work on different group sizes of…

8059746_orig.gif
The Pigpen Cipher is a form of substitution cipher that uses symbols, rather than other letters. Although its origin is unknown, this cipher was most famously used by the Freemasons in the 18th century- to the point that some know it as the…

Playfair.jpg
The Playfair Cipher was created in 1854 by Charles Wheatstone, and named after Lord Playfair for promoting its use. Initially, it was rejected by the British Foreign Office for appearing complicated. Later, the military began to use it for being…

3703653.jpg
The Rail Fence Cipher is form of transposition cipher that scrambles the letters. It does this by using a grid of x many rows, and the sender writes the plaintext in the grid in a vertical zig-zag pattern. The key for this cipher is the number of…

9454144.jpg
A Route Cipher is a type of transposition cipher where you write the message into a grid box and read the letters in a certain route. This cipher was used by the Union forces during the Civil War. However, they took care to use it in a way that moved…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2