Stylesheet Cipher

The Stylesheet cipher is a layered substitution system inspired by cascading logic rather than mechanical encryption devices. Instead of applying a single rigid transformation, the cipher applies ordered visual rules to plaintext, allowing the message to be manipulated in structured passes. Each rule modifies the text according to position, character class, or pattern. When multiple rules overlap, precedence determines the final result.

ASCII Converter

The ASCII Converter is a tool and concept used to translate characters into their corresponding ASCII numerical codes and vice versa. ASCII, or the American Standard Code for Information Interchange, assigns a unique numeric value to each letter, digit, punctuation mark, and control character, typically ranging from 0 to 127 for the standard 7-bit set. By converting plaintext into ASCII numbers, messages can be represented in numeric form, enabling text-based communication across computers and early telecommunication systems.

Binary Converter

Binary code is a system of representing information or data using only two symbols, typically 0 and 1. It is the basis of all digital systems, including computers. In binary code, each digit is called a bit (short for binary digit) and represents the presence or absence of a particular signal or state.

T9 AKA Phone Code

In the T9 system, each digit key on the phone keypad corresponds to a set of letters. By pressing the keys multiple times, you cycle through the letters associated with each key. The mapping of letters to the keypad digits is based on the arrangement of letters on a standard telephone keypad:

NATO Cipher

It is a phonetic alphabet that uses 26 code words.

These words are used to ensure oral communication is clearly understood.

The NATO, North Atlantic Treaty Organization, phonetic alphabet became effective in 1956 and just a few years later became the established universal phonetic alphabet.

However, it took several adaptations before the version used today came into effect.

Zodiac Cipher

The Zodiac Cipher is a symbolic substitution cipher that encodes plaintext letters into a set of distinct Zodiac-themed symbols. Unlike historical cryptograms associated with the Zodiac Killer, this version is purely thematic, using visual symbols inspired by astrological signs to represent letters of the alphabet. The cipher is typically monoalphabetic, meaning each plaintext letter maps to a single symbol, but it can be adapted with a keyword to shuffle the symbol order for added security.

Tap Code

The Tap Code is a manual cipher system used for encoding messages through a series of taps, knocks, or other simple signals, and was popularized for covert communication among prisoners of war in the 20th century, particularly during World War II and the Vietnam War. It is essentially a numeric substitution cipher based on a 5×5 Polybius square in which letters are assigned coordinates, with C and K sharing a single position.

Patristic Cipher

The Patristic Cipher, also known as a Patristocrat, is a form of monoalphabetic substitution cipher specifically designed to conceal word boundaries and sentence structure. Unlike a standard substitution cipher where spaces are preserved, the Patristic Cipher removes all spaces and punctuation from the plaintext and then regroups the resulting ciphertext into uniform blocks, traditionally of five letters. This visual flattening makes frequency analysis more difficult and forces the solver to reconstruct word breaks mentally.

Nihilist Cipher

The Nihilist Cipher is a classical cipher combining fractionation and polyalphabetic substitution, invented by the Russian-Jewish revolutionary and cryptographer F. K. Nihilist in the 1880s. It gained practical notoriety among Russian revolutionary groups for clandestine communication. The cipher operates by first converting plaintext letters into numbers using a Polybius square, then adding a numeric key sequence to these numbers to create the ciphertext.

M-94 Cipher

The M-94 Cipher is a mechanical polyalphabetic cipher device used by the United States military, based on the earlier Jefferson Disk cipher invented by Thomas Jefferson in 1795. It was officially adopted in the early 20th century, around 1922, to provide secure field communication before the widespread use of electronic encryption machines. The device consists of a set of rotating disks mounted on a cylinder, each disk engraved with a scrambled alphabet.