Functionally similar to "Variant Beaufort" and this also supports autokey.Īnalyze - Shows how often certain letters appear in your text. Vigenère - Based somewhat on the Caesarian shift cipher, this changes the shift amount with each letter in the message and those shifts are based on a passphrase. Übchi - A double columnar transposition cipher that uses the same key, but adds a number of pad characters. Skip - To decode this, you count N characters, write down the letter, count forward N characters, write down the letter, etc. Rotate - This acts as though you are writing the letters in a rectangular grid and then rotating the grid to the left or right 90° Rail Fence - A mildly complicated one where you align letters on different rows and then squish the letters together in order to create your ciphertext. It is fairly strong for a pencil and paper style code. Playfair - This cipher uses pairs of letters and a 5x5 grid to encode a message. One Time Pad - A virtually uncrackable cipher that relies heavily upon a random source for an encryption key. Gronsfeld - This operates very similar to a Vigenère cipher, but uses numbers instead of a key word. A simple cypher, but one that is featured on the Kryptos sculpture at the CIA headquarters.ĭouble Columnar Transposition - Because two is better than one. Traditionally, the offset is 3, making A into D, B into E, etc.Ĭolumnar Transposition - Write a message as a long column and then swap around the columns. An easy and fairly secure pencil & paper cipher.Ĭaesar - A Caesar cipher lets you add an arbitrary value, shifting each letter forwards or backwards. Typically, these have more options and settings, allowing a single algorithm to apply to the message in a variety of ways.Īffine - Similar to a Caesarian shift, but also adds in a multiplier to further scramble letters.īaconian - Used to hide a message within another message by using different typefaces or other distinguishing characteristics.īifid - Breaks information for each letter up and spreads it out in the encoded message. Alternately, it can encode letters into different letters using an algorithm so one letter in the cipher text could be any number of letters in the plain text. This may shuffle letters around in order to obfuscate the plain text. ![]() Wingdings - Hide the text using icons instead of letters. Webdings - See your message in a set of symbols Spirit DVD Code - The Mars rover has a DVD with a code printed around the perimeter. Rot13 - Swap letters from the beginning of the alphabet with the letters at the end of the alphabet. Pigpen - Old substitution cipher, said to be used by Hebrew rabbis and the Knights Templar. Morse Code - Once used to transmit messages around the world, this system can still be used in certain situations to send messages effectively when alternate mediums are not available. A simple replacment method that is usually the first one taught to children and is still an effective way to obscure your message. Letter Numbers - Replace each letter with the number of its position in the alphabet. Lego Bionicle - Different letter sets used in the Lego Bionicle world. Gold Bug - A substitution cipher from an Edgar Allan Poe short story. At most, you will select an alphabet, possibly key it, and maybe select an option for how the algorithm works.Īmerican Sign Language - These are the hand signs one uses to finger spell when a more advanced sign isn't known.Ītbash - A very simplistic cipher where you change A to Z, B to Y, and so on.īase64 - This is typically used to make binary data safe to transport as strictly text.īinary - Encode letters in their 8-bit equivalents.ĭancing Men - Sherlock Holmes solved a mystery that used a stick man cipher.įlag Semaphore - Signaling messages using flags, often from ship to ship. This is the most basic way to hide a message because the translation of the letter doesn't ever change. ![]() Replaces a letter with another letter or a set of symbols. If you know of another cipher that you think should be on here or a tool that would be useful, request it and perhaps it can be added to the site. This is a page dedicated to simple text manipulation tools, which all can be replicated with just paper and pencil. If the message isn't that important or if it is intended to be decrypted by hand, you should use a simpler tool. You can use a full-blown encryption tool, such as PGP. Let's say that you need to send your friend a message, but you don't want another person to know what it is.
0 Comments
Leave a Reply. |