Browse Items (30 total)

t52d_layout.png
The T-52 G-Schreiber was developed around 1930 by Siemens & Halske. It was used by the Germans in WWII in conjunction with the Enigma and Lorenz. Intercepting messages that were in-depth enough to decipher was difficult for Allied codebreakers…

code_Caesar_skytale.jpg
The scytale is known as the first cryptographic device, used in 400 B.C. by the Spartans. It consisted of a baton and a papyrus strips with letters. These papyrus strips would only reveal the message sent between Spartan generals if the baton they…

Tags: ,

security-aes_design_desktop.jpg
The Advanced Encryption Standard (AES) is a symmetric block cipher that was began development in 1997 to replace the Data Encryption Standard. It chosen as the U.S. federal government standard encryption algorithm in 2002. In 2003, it became the…

Tags: ,

8059746_orig.gif
The Pigpen Cipher is a form of substitution cipher that uses symbols, rather than other letters. Although its origin is unknown, this cipher was most famously used by the Freemasons in the 18th century- to the point that some know it as the…

9204085.jpg
The Affine Cipher is a form of substitution cipher that involves math. The shift of the alphabet- while transpositioning plaintext into ciphertext is determined by a mathematical equation. This equation is:

E(x) = (ax+b) mod m

E(x) = The…

3703653.jpg
The Rail Fence Cipher is form of transposition cipher that scrambles the letters. It does this by using a grid of x many rows, and the sender writes the plaintext in the grid in a vertical zig-zag pattern. The key for this cipher is the number of…

9454144.jpg
A Route Cipher is a type of transposition cipher where you write the message into a grid box and read the letters in a certain route. This cipher was used by the Union forces during the Civil War. However, they took care to use it in a way that moved…

2020-04-26 05_28_04-Frequency Analysis_ Breaking the Code - Crypto Corner.jpg
Frequency Analysis is a method of code breaking that works to decipher all substitution ciphers. This methods relies on the fact that some letters of the alphabet are used more than other letters of the alphabet. For example, 'E' is more commonly…

sigaba_controls.png
SIGABA was an electro-mechanical cipher machine created in the late 1930s by the US Army and Navy. It was considered an impressive cryptomachine in that time period to the degree that it was used throughout WWII and into the 1950s.

By the end of…

Tags: ,

carrier-pigeon-message.jpg
The WWII Pigeon Cipher describes a coded message found on the remains of a carrier pigeon discovered in 1982. This message was sent to the curator of the Pigeons at War exhibit at Bletchly Park, however he found it impossible to crack.

In 2012,…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2