Tag: encryption

Vatsyayana cipher

Vatsyayana-substitution-cipher

The Vatsyayana cipher is a simple substitution cipher where the 26 letters of the alphabet are organised into 13 pairs of characters. These pairs are then used to encrypt the text by direct substitution of the letters in the pairs.

Caesar Shift (Substitution Cipher)

caesar-cipher-wheel

A Caesar Shift cipher is a type of mono-alphabetic substitution cipher where each letter of the plain text is shifted a fixed number of places down the alphabet. For example, with a shift of 1, letter A would be replaced

Frequency Analysis

frequency-analysis-english-language

In cryptography, frequency analysis is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking substitution ciphers (e.g. mono-alphabetic substitution cipher, Caesar shift cipher, Vatsyayana cipher). Frequency

Mono-Alphabetic Substitution Cipher

encryption

A mono-alphabetic cipher (aka simple substitution cipher) is a substitution cipher where each letter of the plain text is replaced with another letter of the alphabet. It uses a fixed key which consist of the 26 letters of a “shuffled

Enigma Encoder

The enigma machine was used in World War II to encrypt secret messages.

The Enigma machines are a series of electro-mechanical rotor cipher machines. The first machines were invented at the end of World War I by German engineer Arthur Scherbius and were mainly used to protect commercial, diplomatic and military communication. Enigma

Turing-Welchman Bombe Simulator

turing-welchman-bombe-4-drums

In our Enigma – mission X challenge, we looked at how the Enigma machine was used by the Germans during WWII to encrypt radio communications and how code breakers were assigned the job to crack the code of the Enigma

Enigma Daily Settings Generator

enigma-m3-ukw-b

Before attempting this challenge, you should familiarise yourself with the Enigma machine by completing the Enigma Mission X challenge. Code Books were used by the Germans to list all the settings needed to set up the Enigma machines before starting

Enigma – Mission X Challenge

top-secret-stamp

Dear code breaker, I am contacting you from Bletchley Park as we are intercepting an increased volume of encrypted radio signals. We are working day and night to break the enigma codes that the German Navy are updating every day.

Enigma Machine Emulator

The enigma machine was used in World War II to encrypt secret messages.

The Enigma machines are a series of electro-mechanical rotor cipher machines. The first machines were invented at the end of World War I by German engineer Arthur Scherbius and were mainly used to protect commercial, diplomatic and military communication. Enigma

Symmetric vs. Asymmetric Encryption

Symmetric Encryption: The same cryptographic key is used both to encrypt and decrypt messages.

Cryptography is the art of encoding and decoding secret messages. Cryptographic techniques have been used for thousands of years, well before the introduction of computers, and the techniques have evolved since. (e.g. See how the Caesar Cipher was used by