Tag: cryptography

The Rail Fence Cipher

The rail fence cipher (sometimes called zigzag cipher) is a transposition cipher that jumbles up the order of the letters of a message using a basic algorithm. The rail fence cipher works by writing your message on alternate lines across

Semaphore Code Using Python Turtle

Flag semaphore is a telegraphy system conveying information at a distance by means of visual signals with hand-held flags. Information is encoded by the position of the flags. The current flag semaphore system uses two short poles with square flags,

Cryptographic Challenge: Base64 to Hex

Extension Task Using the same approach, we can encode message in a range of encoding schemes such as Hexadeximal (4-bits per character), Base32 (5 bits per character), Base64 (6 bits per character), Extended ASCII (8 bits per character). You can

Caesar Cipher

In cryptography, a Caesar cipher, also known as shift cipher, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter

Secret Code

In this challenge we are putting your deciphering skills to the test. Here are your secret codes. Will you be able to decode these? Cipher #1 0101010001101000011001010010000001000001010100110100001101001001010010010010000001100011011011110110010001100101001000000110100101110011001000000111010101110011011001010110010000100000011101000110111100100000011000110110111101101110011101100110010101110010011101000010000001110100011001010111100001110100001000000111010001101111001000000110001001101001011011100110000101110010011110010010000001100011011011110110010001100101001000010010000001010100011010000110010100100000010000010101001101000011010010010100100100100000011000110110111101100100011001010010000001100011011011110110111001110100011000010110100101101110011100110010000000110001001100100011100000100000011000110110100001100001011100100110000101100011011101000110010101110010011100110010111000100000010101000110100001100101001000000110010101111000011101000110010101101110011001000110010101100100001000000100000101010011010000110100100101001001001000000110001101101111011001000110010100100000011000110110111101101110011101000110000101101001011011100111001100100000001100100011010100110110001000000110001101101000011000010111001001100001011000110111010001100101011100100111001100101110 Cipher #2 \u0055\u006e\u0069\u0063\u006f\u0064\u0065 \u0069\u0073 \u0061 \u0063\u0068\u0061\u0072\u0061\u0063\u0074\u0065\u0072 \u0073\u0065\u0074 \u0075\u0073\u0069\u006e\u0067 \u0032 \u0042\u0079\u0074\u0065\u0073 \u0070\u0065\u0072 \u0063\u0068\u0061\u0072\u0061\u0063\u0074\u0065\u0072 \u0077\u0068\u0069\u0063\u0068

The Legend of the Secret Key

The legend of the secret key is based around King Richard II, King of England. In 1399, Richard II decided to hide his treasure in a treasure chest and used four keys to lock his treasure chest. He asked his

Morse Code Encoder

The aim of this challenge is to create a Morse code converter that lets the user enter any message. The program should then display the message in Morse code. To complete this challenge you will need to know how Morse