• different types of substitution cipher. If the cipher operates on single letters, it is termed a simple substitution cipher; a cipher that operates on larger...
    30 KB (4,028 words) - 07:04, 25 June 2025
  • Thumbnail for Caesar cipher
    message, so the cipher is classed as a type of monoalphabetic substitution, as opposed to polyalphabetic substitution. The Caesar cipher is named after...
    19 KB (2,078 words) - 22:30, 21 June 2025
  • Thumbnail for Pigpen cipher
    Napoleon cipher, and tic-tac-toe cipher) is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid...
    13 KB (1,675 words) - 00:31, 11 July 2025
  • polyalphabetic cipher is a substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though...
    6 KB (735 words) - 02:16, 26 May 2025
  • Classical ciphers are often divided into transposition ciphers and substitution ciphers, but there are also concealment ciphers. In a substitution cipher, letters...
    15 KB (2,528 words) - 18:09, 11 December 2024
  • Thumbnail for Playfair cipher
    Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher...
    20 KB (2,541 words) - 19:04, 1 April 2025
  • Thumbnail for Transposition cipher
    between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption...
    27 KB (3,838 words) - 08:23, 5 June 2025
  • Thumbnail for Cipher
    ciphers used in the past are sometimes known as classical ciphers. They include simple substitution ciphers (such as ROT13) and transposition ciphers...
    18 KB (2,152 words) - 04:08, 13 July 2025
  • Atbash (redirect from Atbash cipher)
    Atbash (Hebrew: אתבש; also transliterated Atbaš) is a monoalphabetic substitution cipher originally used to encrypt the Hebrew alphabet. It can be modified...
    7 KB (643 words) - 17:53, 2 May 2025
  • of ciphers known as polygraphic substitution ciphers. This adds significant strength to the encryption when compared with monographic substitution ciphers...
    8 KB (1,527 words) - 12:12, 4 December 2024
  • one of three categories of cipher used in classical cryptography along with substitution ciphers and transposition ciphers. In classical cryptography...
    11 KB (1,498 words) - 09:32, 29 December 2024
  • Thumbnail for Hill cipher
    Hill cipher is a polygraphic substitution cipher based on linear algebra. Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which...
    13 KB (2,241 words) - 21:56, 17 October 2024
  • Thumbnail for Ciphertext
    Ciphertext (redirect from Cipher text)
    Caesar cipher and one-time pad) Polyalphabetic substitution cipher: a substitution cipher using multiple substitution alphabets (e.g., Vigenère cipher and...
    9 KB (1,139 words) - 21:45, 22 March 2025
  • are used: for instance, a cipher in which pairs of letters are substituted is bigraphic. As a concept, polygraphic substitution contrasts with monoalphabetic...
    4 KB (580 words) - 23:49, 19 March 2025
  • Thumbnail for Frequency analysis
    potential to be exploited in a ciphertext-only attack. In a simple substitution cipher, each letter of the plaintext is replaced with another, and any particular...
    16 KB (1,663 words) - 21:40, 19 June 2025
  • Thumbnail for Symmetric-key algorithm
    use either stream ciphers or block ciphers. Stream ciphers encrypt the digits (typically bytes), or letters (in substitution ciphers) of a message one...
    15 KB (1,540 words) - 21:14, 19 June 2025
  • The affine cipher is a type of monoalphabetic substitution cipher, where each letter in an alphabet is mapped to its numeric equivalent, encrypted using...
    10 KB (1,141 words) - 02:53, 12 February 2025
  • Thumbnail for Bacon's cipher
    than its content. Baconian ciphers are categorized as both a substitution cipher (in plain code) and a concealment cipher (using the two typefaces). To...
    8 KB (775 words) - 20:19, 31 March 2025
  • Thumbnail for Substitution–permutation network
    cryptography, an SP-network, or substitution–permutation network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES...
    7 KB (958 words) - 10:15, 4 January 2025
  • Thumbnail for Music cipher
    music ciphers that utilize homophonic substitution (one-to-many), polyphonic substitution (many-to-one), compound cipher symbols, and/or cipher keys;...
    27 KB (3,733 words) - 17:37, 26 May 2025
  • Thumbnail for Enigma machine
    The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication...
    93 KB (11,280 words) - 08:12, 12 July 2025
  • of ciphers known as polygraphic substitution ciphers. This adds significant strength to the encryption when compared with monographic substitution ciphers...
    11 KB (1,673 words) - 23:01, 27 November 2024
  • Thumbnail for Book cipher
    This method was used in the second Beale cipher. This variant is more properly called a substitution cipher, specifically a homophonic one. Both methods...
    15 KB (2,057 words) - 13:32, 19 May 2025
  • Thumbnail for Copiale cipher
    in Sweden, found the cipher to be an encrypted German text. The manuscript is a homophonic cipher that uses a complex substitution code, including symbols...
    9 KB (962 words) - 20:01, 6 July 2025
  • The Beaufort cipher, created by Sir Francis Beaufort, is a substitution cipher similar to the Vigenère cipher, with a slightly modified enciphering mechanism...
    7 KB (839 words) - 03:18, 12 February 2025
  • Thumbnail for Dorabella Cipher
    applied cipher-solving computer algorithms to the Dorabella cipher and discovered that it is unlikely to be a monoalphabetic substitution cipher in English...
    10 KB (1,282 words) - 15:46, 24 June 2025
  • Thumbnail for Rotor machine
    advance positions, changing the substitution. By this means, a rotor machine produces a complex polyalphabetic substitution cipher, which changes with every...
    17 KB (2,462 words) - 12:35, 29 November 2024
  • consistent with the one-time pad being unbreakable. For a simple substitution cipher, the number of possible keys is 26! = 4.0329 × 1026 = 288.4, the...
    7 KB (980 words) - 23:44, 24 May 2025
  • Thumbnail for Cryptanalysis
    Frequency analysis relies on a cipher failing to hide these statistics. For example, in a simple substitution cipher (where each letter is simply replaced...
    44 KB (5,206 words) - 21:55, 19 June 2025
  • S-box (redirect from Substitution boxes)
    cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution. In block ciphers, they are typically...
    10 KB (929 words) - 20:28, 24 May 2025