• In classical cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide...
    10 KB (1,298 words) - 08:50, 11 November 2024
  • substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units"...
    30 KB (4,028 words) - 08:08, 12 June 2025
  • Thumbnail for Book cipher
    book cipher is a cipher in which each word or letter in the plaintext of a message is replaced by some code that locates it in another text, the key. A...
    15 KB (2,057 words) - 13:32, 19 May 2025
  • intercepts two messages encrypted with the same key, they can recover A xor B, which is a form of running key cipher. Even if neither message is known, as long...
    7 KB (1,029 words) - 00:34, 14 November 2024
  • Thumbnail for Vigenère cipher
    encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key. For example, if the plaintext...
    45 KB (6,033 words) - 08:10, 12 June 2025
  • Thumbnail for Block cipher mode of operation
    same key. Block ciphers may be capable of operating on more than one block size, but during transformation the block size is always fixed. Block cipher modes...
    52 KB (5,828 words) - 12:52, 13 June 2025
  • Thumbnail for One-time pad
    One-time pad (redirect from Vernam cipher)
    of one-time pad ciphers have been used by nations for critical diplomatic and military communication, but the problems of secure key distribution make...
    55 KB (7,403 words) - 09:03, 8 June 2025
  • Thumbnail for Tabula recta
    value of a letter from a companion ciphertext in a running key cipher, a constant for a Caesar cipher, or a zero-based counter with some period in Trithemius's...
    7 KB (939 words) - 23:25, 2 February 2024
  • Thumbnail for Autokey cipher
    An autokey cipher (also known as the autoclave cipher) is a cipher that incorporates the message (the plaintext) into the key. The key is generated from...
    9 KB (1,278 words) - 03:31, 26 March 2025
  • cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks. Block ciphers are the elementary building...
    51 KB (6,569 words) - 08:42, 11 April 2025
  • Thumbnail for Pigpen cipher
    pigpen cipher (alternatively referred to as the masonic cipher, Freemason's cipher, Rosicrucian cipher, Napoleon cipher, and tic-tac-toe cipher) is a geometric...
    13 KB (1,674 words) - 01:25, 17 April 2025
  • Thumbnail for Codebook
    with 30,000 random additives. The book used in a book cipher or the book used in a running key cipher can be any book shared by sender and receiver and is...
    4 KB (526 words) - 03:22, 20 March 2025
  • Thumbnail for Caesar cipher
    In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely...
    19 KB (2,068 words) - 07:59, 5 June 2025
  • Thumbnail for Hill cipher
    for encryption is the cipher key, and it should be chosen randomly from the set of invertible n × n matrices (modulo 26). The cipher can, of course, be adapted...
    13 KB (2,241 words) - 21:56, 17 October 2024
  • Thumbnail for Playfair cipher
    The Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution...
    20 KB (2,541 words) - 19:04, 1 April 2025
  • Thumbnail for Transposition cipher
    In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (transposition)...
    27 KB (3,838 words) - 08:23, 5 June 2025
  • Thumbnail for Enigma machine
    The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication...
    93 KB (11,280 words) - 00:18, 16 June 2025
  • The Two-square cipher, also called double Playfair, is a manual symmetric encryption technique. It was developed to ease the cumbersome nature of the large...
    11 KB (1,673 words) - 23:01, 27 November 2024
  • Gilbert Vernam (category Stream ciphers)
    stream cipher and later co-invented an automated one-time pad cipher. Vernam proposed a teleprinter cipher in which a previously prepared key, kept on...
    9 KB (904 words) - 12:23, 7 December 2024
  • The four-square cipher is a manual symmetric encryption technique. It was invented by the French cryptographer Felix Delastelle. The technique encrypts...
    8 KB (1,527 words) - 12:12, 4 December 2024
  • In cryptography, the ADFGVX cipher was a manually applied field cipher used by the Imperial German Army during World War I. It was used to transmit messages...
    13 KB (1,696 words) - 18:23, 13 February 2025
  • In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern...
    15 KB (2,528 words) - 18:09, 11 December 2024
  • Thumbnail for Feistel cipher
    cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the...
    10 KB (1,316 words) - 19:41, 2 February 2025
  • polyalphabetic cipher is a substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though...
    6 KB (735 words) - 02:16, 26 May 2025
  • Atbash (redirect from Atbash cipher)
    only one way to perform this, the Atbash cipher provides no communications security, as it lacks any sort of key. If multiple collating orders are available...
    7 KB (643 words) - 17:53, 2 May 2025
  • Thumbnail for Rail fence cipher
    The rail fence cipher (also called a zigzag cipher) is a classical type of transposition cipher. It derives its name from the manner in which encryption...
    7 KB (1,105 words) - 17:25, 28 December 2024
  • In cryptography, key size or key length refers to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the...
    29 KB (3,225 words) - 01:39, 6 June 2025
  • Thumbnail for Public-key cryptography
    cryptosystems. Before the mid-1970s, all cipher systems used symmetric key algorithms, in which the same cryptographic key is used with the underlying algorithm...
    40 KB (4,510 words) - 15:13, 16 June 2025
  • Thumbnail for VIC cipher
    The VIC cipher was a pencil and paper cipher used by the Soviet spy Reino Häyhänen, codenamed "VICTOR". If the cipher were to be given a modern technical...
    19 KB (2,669 words) - 19:07, 16 February 2025
  • Thumbnail for Beale ciphers
    The Beale ciphers are a set of three ciphertexts, one of which allegedly states the location of a buried treasure of gold, silver and jewels estimated...
    34 KB (4,264 words) - 01:11, 31 May 2025