Giovanni Fontana Cipher
The Giovanni Fontana Cipher, attributed to the Italian engineer and writer Giovanni Fontana in the 15th century, is an early example of a cryptographic method known as a homophonic substitution cipher.
Francis Bacons Substitution Cipher
Francis Bacon's Substitution Cipher is an ingenious cryptographic technique devised by the English philosopher and statesman Sir Francis Bacon in the late 16th and early 17th centuries. It is a form of steganography, a method of concealing secret messages within seemingly ordinary text.
Elite
ORIGIN: Internet
It is an alphabet that uses encoded letters.
This is used to ensure communication by noobs are misunderstood.
The Elite, leet, i33t or 1337 alphabet became effective in the 90s and just a few seconds later was established as the universal 1337 alphabet of the interwebs.
However, it took several iterations before the version used today equally confused enough people.
Dorabella Cipher
The Dorabella Cipher is a mysterious and elegant encrypted message created by English poet Edward Elgar for a close friend, Dora Penny, in 1897. It is a substitution cipher, a type of code where each letter in the plaintext is replaced with a different letter or symbol to conceal the original message.
Digraph Cipher
A Digraph Cipher is a cryptographic technique that operates on pairs of letters (digraphs) rather than individual letters. It is a substitution cipher where each digraph in the plaintext is replaced by a corresponding digraph in the ciphertext according to a predefined rule or key.
Here's a general overview of how a Digraph Cipher works:
Dice Cipher
A Dice Cipher, also known as a Dice Cryptography or a Book Cipher, is a cryptographic technique that uses dice as a randomization tool to generate a series of numbers that correspond to words or characters in a pre-selected reference book. It is a form of polyalphabetic substitution cipher.
Here's a general overview of how a Dice Cipher works:
Columnar Cipher
The Columnar cipher is a transposition cipher that rearranges the characters of a message by writing them in a grid format and then reading them column by column in a specific order. It does not change the actual characters but alters their order to create the ciphertext.
Here's how the Columnar cipher works:
Cicada 3301
Cicada 3301 is a mysterious and enigmatic online puzzle or alternate reality game that gained notoriety for its complexity and anonymity. It first appeared in January 2012 with a series of cryptic puzzles and challenges, often posted on various internet forums and websites.
The puzzles typically involve a combination of cryptography, steganography, computer programming, and knowledge of various disciplines. Solving these challenges often requires a deep understanding of diverse subjects and analytical skills.
Caesar Cipher
The Caesar cipher is one of the simplest and best-known encryption techniques. It is a substitution cipher that operates by shifting the letters of the alphabet a certain number of positions to encrypt and decrypt messages. This cipher is named after Julius Caesar, who is said to have used it for communication.
In the Caesar cipher:
Book Cipher
A book cipher is a method of encryption and decryption that employs a physical book or text as the key. In this technique, secret messages are concealed by referencing specific words or passages from the book to encode and decode information. To encrypt a message, each word in the plaintext is replaced with a corresponding word or phrase found at a predetermined location within the chosen book.