Elite

ORIGIN: Internet

It is an alphabet that uses encoded letters.

This is used to ensure communication by noobs are misunderstood.

The Elite, leet, i33t or 1337 alphabet became effective in the 90s and just a few seconds later was established as the universal 1337 alphabet of the interwebs.

However, it took several iterations before the version used today equally confused enough people.

Digraph Cipher

A Digraph Cipher is a cryptographic technique that operates on pairs of letters (digraphs) rather than individual letters. It is a substitution cipher where each digraph in the plaintext is replaced by a corresponding digraph in the ciphertext according to a predefined rule or key.

Here's a general overview of how a Digraph Cipher works:

Dice Cipher

A Dice Cipher, also known as a Dice Cryptography or a Book Cipher, is a cryptographic technique that uses dice as a randomization tool to generate a series of numbers that correspond to words or characters in a pre-selected reference book. It is a form of polyalphabetic substitution cipher.

Here's a general overview of how a Dice Cipher works:

Cicada 3301

Cicada 3301 is a mysterious and enigmatic online puzzle or alternate reality game that gained notoriety for its complexity and anonymity. It first appeared in January 2012 with a series of cryptic puzzles and challenges, often posted on various internet forums and websites.

The puzzles typically involve a combination of cryptography, steganography, computer programming, and knowledge of various disciplines. Solving these challenges often requires a deep understanding of diverse subjects and analytical skills.

Caesar Cipher

The Caesar cipher is one of the simplest and best-known encryption techniques. It is a substitution cipher that operates by shifting the letters of the alphabet a certain number of positions to encrypt and decrypt messages. This cipher is named after Julius Caesar, who is said to have used it for communication.

In the Caesar cipher:

Book Cipher

A book cipher is a method of encryption and decryption that employs a physical book or text as the key. In this technique, secret messages are concealed by referencing specific words or passages from the book to encode and decode information. To encrypt a message, each word in the plaintext is replaced with a corresponding word or phrase found at a predetermined location within the chosen book.