• The Two-square cipher, also called double Playfair, is a manual symmetric encryption technique. It was developed to ease the cumbersome nature of the...
    11 KB (1,673 words) - 23:01, 27 November 2024
  • Thumbnail for Playfair cipher
    The Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution...
    20 KB (2,541 words) - 19:04, 1 April 2025
  • The four-square cipher is a manual symmetric encryption technique. It was invented by the French cryptographer Felix Delastelle. The technique encrypts...
    8 KB (1,527 words) - 12:12, 4 December 2024
  • In classical cryptography, the bifid cipher is a cipher which combines the Polybius square with transposition, and uses fractionation to achieve diffusion...
    3 KB (379 words) - 10:32, 27 February 2025
  • Thumbnail for Polybius square
    square is also used as a basic cipher called the Polybius cipher. This cipher is quite insecure by modern standards, as it is a substitution cipher with...
    10 KB (1,134 words) - 07:37, 25 May 2025
  • rotor-based cipher machine, the Hagelin M-209. The Beaufort cipher is based on the Beaufort square which is essentially the same as a Vigenère square but in...
    7 KB (839 words) - 03:18, 12 February 2025
  • Thumbnail for Vigenère cipher
    The Vigenère cipher (French pronunciation: [viʒnɛːʁ]) is a method of encrypting alphabetic text where each letter of the plaintext is encoded with a different...
    45 KB (6,033 words) - 08:10, 12 June 2025
  • In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern...
    15 KB (2,528 words) - 18:09, 11 December 2024
  • polyalphabetic cipher is a substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though...
    6 KB (735 words) - 02:16, 26 May 2025
  • transposition cipher which combined a modified Polybius square with a single columnar transposition. The cipher is named after the six possible letters used in...
    13 KB (1,696 words) - 18:23, 13 February 2025
  • Thumbnail for Caesar cipher
    In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely...
    19 KB (2,068 words) - 07:59, 5 June 2025
  • In the history of cryptography, the Nihilist cipher is a manually operated symmetric encryption cipher, originally used by Russian Nihilists in the 1880s...
    6 KB (805 words) - 19:42, 12 September 2024
  • In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with...
    30 KB (4,028 words) - 08:08, 12 June 2025
  • Thumbnail for Bacon's cipher
    its content. Baconian ciphers are categorized as both a substitution cipher (in plain code) and a concealment cipher (using the two typefaces). To encode...
    8 KB (775 words) - 20:19, 31 March 2025
  • Thumbnail for Transposition cipher
    In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (transposition)...
    27 KB (3,838 words) - 08:23, 5 June 2025
  • Thumbnail for Autokey cipher
    An autokey cipher (also known as the autoclave cipher) is a cipher that incorporates the message (the plaintext) into the key. The key is generated from...
    9 KB (1,278 words) - 03:31, 26 March 2025
  • Thumbnail for Pigpen cipher
    pigpen cipher (alternatively referred to as the masonic cipher, Freemason's cipher, Rosicrucian cipher, Napoleon cipher, and tic-tac-toe cipher) is a geometric...
    13 KB (1,674 words) - 01:25, 17 April 2025
  • Thumbnail for Symmetric-key algorithm
    use either stream ciphers or block ciphers. Stream ciphers encrypt the digits (typically bytes), or letters (in substitution ciphers) of a message one...
    15 KB (1,540 words) - 19:12, 22 April 2025
  • Thumbnail for VIC cipher
    The VIC cipher was a pencil and paper cipher used by the Soviet spy Reino Häyhänen, codenamed "VICTOR". If the cipher were to be given a modern technical...
    19 KB (2,669 words) - 19:07, 16 February 2025
  • Thumbnail for Book cipher
    A book cipher is a cipher in which each word or letter in the plaintext of a message is replaced by some code that locates it in another text, the key...
    15 KB (2,057 words) - 13:32, 19 May 2025
  • Rabbit is a high-speed stream cipher from 2003. The algorithm and source code was released in 2008 as public domain software. Rabbit was first presented...
    5 KB (640 words) - 06:33, 27 September 2023
  • Thumbnail for Tabula recta
    ciphers, including the Vigenère cipher and Blaise de Vigenère's less well-known autokey cipher. All polyalphabetic ciphers based on the Caesar cipher...
    7 KB (939 words) - 23:25, 2 February 2024
  • In the history of cryptography, a grille cipher was a technique for encrypting a plaintext by writing it onto a sheet of paper through a pierced sheet...
    17 KB (2,249 words) - 10:46, 25 May 2025
  • The D'Agapeyeff cipher is an unsolved cipher that appears in the first edition of Codes and Ciphers, an elementary book on cryptography published by the...
    4 KB (541 words) - 15:35, 12 May 2025
  • Thumbnail for Block cipher mode of operation
    In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or...
    52 KB (5,828 words) - 12:52, 13 June 2025
  • cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks. Block ciphers are the elementary building...
    51 KB (6,569 words) - 08:42, 11 April 2025
  • null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material...
    11 KB (1,498 words) - 09:32, 29 December 2024
  • cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis • Adaptive chosen-ciphertext...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • Thumbnail for Hill cipher
    Hill cipher is a polygraphic substitution cipher based on linear algebra. Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which...
    13 KB (2,241 words) - 21:56, 17 October 2024
  • Thumbnail for Feistel cipher
    cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the...
    10 KB (1,316 words) - 19:41, 2 February 2025