• Thumbnail for Book cipher
    A book cipher is a cipher in which each word or letter in the plaintext of a message is replaced by some code that locates it in another text, the key...
    15 KB (2,057 words) - 13:32, 19 May 2025
  • Thumbnail for Beale ciphers
    The Beale ciphers are a set of three ciphertexts, one of which allegedly states the location of a buried treasure of gold, silver and jewels estimated...
    34 KB (4,264 words) - 15:33, 18 July 2025
  • cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long...
    10 KB (1,298 words) - 08:50, 11 November 2024
  • Thumbnail for Cryptogram
    classical ciphers are sometimes used to create cryptograms. An example is the book cipher, where a book or article is used to encrypt a message. The ciphers used...
    7 KB (806 words) - 17:40, 18 June 2025
  • Thumbnail for Vigenère cipher
    The Vigenère cipher (French pronunciation: [viʒnɛːʁ]) is a method of encrypting alphabetic text where each letter of the plaintext is encoded with a different...
    46 KB (6,098 words) - 04:13, 15 July 2025
  • Thumbnail for Caesar cipher
    In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely...
    19 KB (2,076 words) - 00:10, 17 July 2025
  • The Code Book describes some illustrative highlights in the history of cryptography, drawn from both of its principal branches, codes and ciphers. Thus the...
    4 KB (397 words) - 04:38, 5 May 2025
  • In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with...
    30 KB (4,028 words) - 07:04, 25 June 2025
  • Thumbnail for Cipher
    In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a...
    18 KB (2,152 words) - 16:42, 23 July 2025
  • Thumbnail for Pigpen cipher
    pigpen cipher (alternatively referred to as the masonic cipher, Freemason's cipher, Rosicrucian cipher, Napoleon cipher, and tic-tac-toe cipher) is a geometric...
    13 KB (1,675 words) - 00:31, 11 July 2025
  • Thumbnail for Codebook
    Codebook (redirect from Code book)
    with 30,000 random additives. The book used in a book cipher or the book used in a running key cipher can be any book shared by sender and receiver and...
    4 KB (526 words) - 03:22, 20 March 2025
  • Thumbnail for Block cipher mode of operation
    In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or...
    52 KB (5,830 words) - 14:42, 23 July 2025
  • polyalphabetic cipher is a substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though...
    6 KB (735 words) - 02:16, 26 May 2025
  • Thumbnail for Playfair cipher
    The Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution...
    20 KB (2,541 words) - 19:04, 1 April 2025
  • Thumbnail for Arnold Cipher
    The Arnold Cipher was a book cipher used by John André and Benedict Arnold during the negotiations that led to Arnold's failed attempt to surrender West...
    6 KB (882 words) - 04:22, 18 March 2024
  • In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern...
    15 KB (2,528 words) - 18:09, 11 December 2024
  • Thumbnail for Cryptography
    plaintext. A cipher (or cypher) is a pair of algorithms that carry out the encryption and the reversing decryption. The detailed operation of a cipher is controlled...
    100 KB (11,081 words) - 06:32, 26 July 2025
  • Thumbnail for Lorenz cipher
    The Lorenz SZ40, SZ42a and SZ42b were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz...
    34 KB (3,793 words) - 06:34, 25 May 2025
  • null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material...
    11 KB (1,498 words) - 09:32, 29 December 2024
  • The Great Cipher (French: Grand chiffre) was a nomenclator cipher developed by the Rossignols, several generations of whom served the French monarchs...
    6 KB (776 words) - 20:18, 13 February 2025
  • Century Fox, which entered negotiations to acquire the self-published e-book Wool by Hugh Howey on May 11, 2012. Five days later, 20th Century Fox acquired...
    71 KB (3,473 words) - 18:25, 17 July 2025
  • to Patrick's house, the trio studies the Declaration and discovers a book cipher written in invisible ink. The message refers to Benjamin Franklin's Silence...
    31 KB (2,765 words) - 02:38, 15 July 2025
  • them stole something. Sherlock knows the message is in the form of a book cipher, and he and John spend the night going through the first two victims'...
    15 KB (1,593 words) - 14:27, 8 July 2025
  • considered incriminating. Furthermore, analysis has revealed flaws in the cipher such that it is now considered insecure. This algorithm uses a standard...
    8 KB (1,272 words) - 23:44, 25 May 2023
  • Thumbnail for Enigma machine
    The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication...
    94 KB (11,505 words) - 08:05, 23 July 2025
  • Thumbnail for Hill cipher
    Hill cipher is a polygraphic substitution cipher based on linear algebra. Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which...
    13 KB (2,241 words) - 21:56, 17 October 2024
  • Thumbnail for Zodiac Killer
    Zodiac Killer (redirect from 340 cipher)
    his victims as slaves for the afterlife. He included four cryptograms or ciphers in his correspondence; two were decrypted in 1969 and 2020, and two are...
    95 KB (10,817 words) - 14:38, 27 July 2025
  • Thumbnail for Stream cipher
    stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each...
    23 KB (2,231 words) - 21:32, 1 July 2025
  • Thumbnail for Transposition cipher
    In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (transposition)...
    27 KB (3,838 words) - 08:23, 5 June 2025
  • Thumbnail for Bacon's cipher
    Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605. In steganography, a message is...
    8 KB (775 words) - 20:19, 31 March 2025