different types of substitution cipher. If the cipher operates on single letters, it is termed a simple substitution cipher; a cipher that operates on larger...
30 KB (4,028 words) - 07:04, 25 June 2025
message, so the cipher is classed as a type of monoalphabetic substitution, as opposed to polyalphabetic substitution. The Caesar cipher is named after...
19 KB (2,078 words) - 22:30, 21 June 2025
Napoleon cipher, and tic-tac-toe cipher) is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid...
13 KB (1,675 words) - 00:31, 11 July 2025
polyalphabetic cipher is a substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though...
6 KB (735 words) - 02:16, 26 May 2025
Classical ciphers are often divided into transposition ciphers and substitution ciphers, but there are also concealment ciphers. In a substitution cipher, letters...
15 KB (2,528 words) - 18:09, 11 December 2024
Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher...
20 KB (2,541 words) - 19:04, 1 April 2025
between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption...
27 KB (3,838 words) - 08:23, 5 June 2025
ciphers used in the past are sometimes known as classical ciphers. They include simple substitution ciphers (such as ROT13) and transposition ciphers...
18 KB (2,152 words) - 04:08, 13 July 2025
Atbash (redirect from Atbash cipher)
Atbash (Hebrew: אתבש; also transliterated Atbaš) is a monoalphabetic substitution cipher originally used to encrypt the Hebrew alphabet. It can be modified...
7 KB (643 words) - 17:53, 2 May 2025
of ciphers known as polygraphic substitution ciphers. This adds significant strength to the encryption when compared with monographic substitution ciphers...
8 KB (1,527 words) - 12:12, 4 December 2024
one of three categories of cipher used in classical cryptography along with substitution ciphers and transposition ciphers. In classical cryptography...
11 KB (1,498 words) - 09:32, 29 December 2024
Hill cipher is a polygraphic substitution cipher based on linear algebra. Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which...
13 KB (2,241 words) - 21:56, 17 October 2024
Ciphertext (redirect from Cipher text)
Caesar cipher and one-time pad) Polyalphabetic substitution cipher: a substitution cipher using multiple substitution alphabets (e.g., Vigenère cipher and...
9 KB (1,139 words) - 21:45, 22 March 2025
are used: for instance, a cipher in which pairs of letters are substituted is bigraphic. As a concept, polygraphic substitution contrasts with monoalphabetic...
4 KB (580 words) - 23:49, 19 March 2025
potential to be exploited in a ciphertext-only attack. In a simple substitution cipher, each letter of the plaintext is replaced with another, and any particular...
16 KB (1,663 words) - 21:40, 19 June 2025
Symmetric-key algorithm (redirect from Symmetric cipher)
use either stream ciphers or block ciphers. Stream ciphers encrypt the digits (typically bytes), or letters (in substitution ciphers) of a message one...
15 KB (1,540 words) - 21:14, 19 June 2025
The affine cipher is a type of monoalphabetic substitution cipher, where each letter in an alphabet is mapped to its numeric equivalent, encrypted using...
10 KB (1,141 words) - 02:53, 12 February 2025
than its content. Baconian ciphers are categorized as both a substitution cipher (in plain code) and a concealment cipher (using the two typefaces). To...
8 KB (775 words) - 20:19, 31 March 2025
cryptography, an SP-network, or substitution–permutation network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES...
7 KB (958 words) - 10:15, 4 January 2025
music ciphers that utilize homophonic substitution (one-to-many), polyphonic substitution (many-to-one), compound cipher symbols, and/or cipher keys;...
27 KB (3,733 words) - 17:37, 26 May 2025
Enigma machine (redirect from Enigma cipher machine)
The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication...
93 KB (11,280 words) - 08:12, 12 July 2025
of ciphers known as polygraphic substitution ciphers. This adds significant strength to the encryption when compared with monographic substitution ciphers...
11 KB (1,673 words) - 23:01, 27 November 2024
This method was used in the second Beale cipher. This variant is more properly called a substitution cipher, specifically a homophonic one. Both methods...
15 KB (2,057 words) - 13:32, 19 May 2025
in Sweden, found the cipher to be an encrypted German text. The manuscript is a homophonic cipher that uses a complex substitution code, including symbols...
9 KB (962 words) - 20:01, 6 July 2025
The Beaufort cipher, created by Sir Francis Beaufort, is a substitution cipher similar to the Vigenère cipher, with a slightly modified enciphering mechanism...
7 KB (839 words) - 03:18, 12 February 2025
applied cipher-solving computer algorithms to the Dorabella cipher and discovered that it is unlikely to be a monoalphabetic substitution cipher in English...
10 KB (1,282 words) - 15:46, 24 June 2025
Rotor machine (redirect from Rotor cipher machine)
advance positions, changing the substitution. By this means, a rotor machine produces a complex polyalphabetic substitution cipher, which changes with every...
17 KB (2,462 words) - 12:35, 29 November 2024
consistent with the one-time pad being unbreakable. For a simple substitution cipher, the number of possible keys is 26! = 4.0329 × 1026 = 288.4, the...
7 KB (980 words) - 23:44, 24 May 2025
Cryptanalysis (redirect from Cipher System Identification)
Frequency analysis relies on a cipher failing to hide these statistics. For example, in a simple substitution cipher (where each letter is simply replaced...
44 KB (5,206 words) - 21:55, 19 June 2025
S-box (redirect from Substitution boxes)
cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution. In block ciphers, they are typically...
10 KB (929 words) - 20:28, 24 May 2025