enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Caesar cipher - Wikipedia

    en.wikipedia.org/wiki/Caesar_cipher

    In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet .

  3. Affine cipher - Wikipedia

    en.wikipedia.org/wiki/Affine_cipher

    The affine cipher is a type of monoalphabetic substitution cipher, where each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted back to a letter. The formula used means that each letter encrypts to one other letter, and back again, meaning the cipher is essentially a ...

  4. Tabula recta - Wikipedia

    en.wikipedia.org/wiki/Tabula_recta

    Tabula recta. In cryptography, the tabula recta (from Latin tabula rēcta) is a square table of alphabets, each row of which is made by shifting the previous one to the left.. The term was invented by the German author and monk Johannes Trithemius [1] in 1508, and used in his Trithemius ciph

  5. ROT13 - Wikipedia

    en.wikipedia.org/wiki/ROT13

    ROT13 is a simple letter substitution cipher that replaces a letter with the 13th letter after it in the Latin alphabet. ROT13 is a special case of the Caesar cipher which was developed in ancient Rome, used by Julius Caesar in the 1st century BC. [1] An early entry on the Timeline of cryptography.

  6. Vigenère cipher - Wikipedia

    en.wikipedia.org/wiki/Vigenère_cipher

    The Vigenère cipher is simple enough to be a field cipher if it is used in conjunction with cipher disks. [13] The Confederate States of America, for example, used a brass cipher disk to implement the Vigenère cipher during the American Civil War. The Confederacy's messages were far from secret, and the Union regularly cracked its messages.

  7. Aristocrat Cipher - Wikipedia

    en.wikipedia.org/wiki/Aristocrat_Cipher

    The ciphertext alphabet is rearranged according to a keyword, which then replaces the plaintext letters. K3 Cipher: This variation uses both a keyed plaintext and a keyed ciphertext alphabet, but the same keyword is used for both. K4 Cipher: Similar to the K3 Cipher, but different keywords are used for the plaintext and ciphertext alphabets.

  8. Pigpen cipher - Wikipedia

    en.wikipedia.org/wiki/Pigpen_cipher

    The pigpen cipher uses graphical symbols assigned according to a key similar to the above diagram. [1]The pigpen cipher (alternatively referred to as the masonic cipher, Freemason's cipher, Rosicrucian cipher, Napoleon cipher, and tic-tac-toe cipher) [2] [3] is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid.

  9. Cryptography - Wikipedia

    en.wikipedia.org/wiki/Cryptography

    An early substitution cipher was the Caesar cipher, in which each letter in the plaintext was replaced by a letter three positions further down the alphabet. [23] Suetonius reports that Julius Caesar used it with a shift of three to communicate with his generals. Atbash is an example of an early Hebrew cipher.