Browse Items (30 total)
Sort by:
NESTOR
NESTOR is the NSA-developed speech encryption used by American forces during the Vietnamese War. The encryption was compatible between several devices, including the KY-38 manpack unit, KY-8 vehicular unit, and KY-28 aircraft unit.
Tags: NESTOR, Vietnam War
3DES
The Triple Data Encryption Standard was derived (3DES) was derived from DES, when DES began to falter as a secure form of encryption and before AES was developed.
As suggested by the title, it works by running DES three times with three different…
As suggested by the title, it works by running DES three times with three different…
Tags: 3DES, Encryption
Hill Cipher
The Hill Cipher was developed in 1929 by Lester Hill. A digraph substitution cipher, it works using groups of letters to encrypt. However, it is different from other digraph substitution ciphers because it can work on different group sizes of…
Tags: Hill Cipher
Caesar Cipher
The Caesar Cipher is one of the oldest ciphers, used by Julius Caesar to communicate with his generals. It works by shifting the alphabet down by a fixed number, or key. Due to the simplicity, it can be broken if the crypanalyst knows that a simple…
Tags: Caesar Cipher, Greek
M-94
The M-94 was a cipher device based off the polyalphabetic manual substitution cipher. It was created by US Army major Joseph Mauborgne in 1917 with inspiration from a similar device invented by Thomas Jefferson in 1795. In 1921, it was introduced to…
Tags: M-94
Atbash Cipher
The Atbash Cipher is a monoalphabetic substitution cipher that is relatively simple and does not require a key. Instead of a key, the substitution simply relies on reversing the alphabet. Therefore, 'A' becomes 'Z', 'B' becomes 'Y', and so forth.…
Tags: Atbash Cipher