1
10
1
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/25deff323ce4b30841760a70fae29cd6.jpg?Expires=1712793600&Signature=p6Tr2TgJ-pE24063aGfRTMhBYLsE6dmOfibVn1cMTWIDN8%7E7etW-tTD7H4gWjnyJ3hL3QmKvlSR2-1lnpBxSNPehullx8H4yxNeIA3CKP2rrTGfePd6ze32jVyS87KFJL9bf2B8Kz4TUpic4Syoa3qYbp3DPuF3jukilPwVmdjMrlVJynt-pnO3-KwOupc832D-8I3MdJNNtIu5nd6afnQtY5w4T3wJ%7E18%7EUynsoO2lgMYRcDgMZpduKkZgVrdFi8aMa9eNXAeFHtEMMW9cIxTpq28ixOYb0nrKCCFTKffVbydfxLjrG9nozE8ZULfK3XvsgGJf%7EqFuLTI8GjZ7Ovw__&Key-Pair-Id=K6UGZS9ZTDSZM
e16d8ddf577103c1075ecaf75c2d3c5a
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Classical Ciphers and Application
Subject
The topic of the resource
Classical Ciphers and Application
Description
An account of the resource
Classical Ciphers and Application features analyses of various ciphers- including classical ciphers and the application of ciphers used during WWII. The purpose of the collection is to explain how classical ciphers work and show the patterns among substitution (replacement) and transposition(scramble) ciphers. For further understanding in application, it attempts to provide an analysis of the famous substitution ciphers- the Zimmerman Telegram and WWII Pigeon Cipher.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Route Cipher
Subject
The topic of the resource
Route Cipher
Description
An account of the resource
A Route Cipher is a type of transposition cipher where you write the message into a grid box and read the letters in a certain route. This cipher was used by the Union forces during the Civil War. However, they took care to use it in a way that moved entire words around. In addition, sometimes the would encode a word or add null words to protect their message.
In order to create a route cipher, the dimensions of the put the plaintext in and decide what route you want it to follow. Once that is decided, the ciphertext becomes the letters in the order of the route. Therefore, decrypting a message requires the grid dimensions and route path as keys.
Creator
An entity primarily responsible for making the resource
Unknown
Source
A related resource from which the described resource is derived
https://crypto.interactive-maths.com/route-cipher.html
Publisher
An entity responsible for making the resource available
Crypto Corner
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Type
The nature or genre of the resource
Cipher
Contributor
An entity responsible for making contributions to the resource
Daniel Rodriguez-Clark
Civil War
Route Cipher