Combination
The Combination Cipher is not a single fixed algorithm but a method that deliberately combines two or more classical ciphers into a layered encryption process. By applying multiple techniques in sequence — typically a substitution followed by a transposition — the resulting ciphertext becomes significantly harder to analyze than either method alone.
Chaocipher
The Chaocipher is a sophisticated and historically intriguing cipher invented by John F. Byrne in 1918. Unlike traditional substitution ciphers, the Chaocipher uses two rotating disks—one for the plaintext alphabet and one for the ciphertext alphabet—both of which are permuted after each letter is encrypted. This dynamic reordering ensures that the same plaintext letter never encrypts to the same ciphertext letter twice in a row, creating a highly irregular polyalphabetic system.
Caesar
The Caesar Cipher is a classical substitution cipher named after Julius Caesar, who reportedly used it to encrypt private correspondence. It shifts each letter in the plaintext by a fixed number of positions down the alphabet. This simplicity makes it easy to understand and implement, but also vulnerable to frequency analysis and brute-force attacks due to its limited keyspace.
Book
The Book Cipher is a classical encryption method in which numbers in the ciphertext refer to positions within an agreed-upon text, known as the key book. Instead of substituting letters directly, the cipher uses an external document as the lookup table. Without the exact same book, edition, and formatting, the ciphertext is effectively meaningless.
Book Cipher: Encoding
By default, spaces and punctuation are excluded when counting positions. Letters are indexed sequentially as a continuous stream of characters.
Using the key text:
Bifid
The Bifid Cipher is a classical polygraphic cipher developed by Félix Delastelle in the early 20th century. It combines a Polybius (Square) Cipher with transposition to create a system that diffuses plaintext letters across multiple ciphertext symbols.
Beaufort
The Beaufort Cipher is a polyalphabetic substitution cipher closely related to the Vigenère Cipher. Invented by Sir Francis Beaufort in the 19th century, it uses a reversed encryption mechanism compared to Vigenère: instead of adding key values to plaintext letters, the plaintext letters are subtracted from the key letters modulo 26. This results in a symmetric system where encryption and decryption processes are identical, simplifying usage while retaining polyalphabetic complexity.
Beale
The Beale Cipher is a set of three ciphertexts that allegedly reveal the location of a hidden treasure buried in the United States in the early 19th century. Only one of the three ciphers, commonly referred to as Beale Cipher #2, has been solved, revealing the treasure’s contents using a book cipher method.
Autokey
The Autokey Cipher is a polyalphabetic substitution cipher designed to reduce the repetition vulnerabilities found in simpler systems such as the Caesar Cipher. Instead of using a short, repeating key, the Autokey Cipher extends the key by appending the plaintext itself after an initial keyword. This produces a variable-length key that is as long as the message, effectively minimizing repeated patterns and increasing resistance to frequency analysis.
Atbash
The Atbash Cipher is a classical monoalphabetic substitution cipher that works by reversing the standard alphabet. In its simplest form, A is replaced by Z, B by Y, C by X, and so on, effectively mirroring the alphabet around its midpoint. This simple inversion makes it a symmetric cipher: encryption and decryption are identical operations. The Atbash Cipher has roots in ancient Hebrew cryptography but has been adapted for use with the Latin alphabet and other scripts.
Alberti
The Alberti Cipher, invented by Leon Battista Alberti in the 15th century, is widely regarded as the first polyalphabetic cipher. It introduced the revolutionary concept of using multiple cipher alphabets to encrypt a message, rather than relying on a single fixed substitution. This approach significantly reduced the effectiveness of frequency analysis, which had compromised simpler monoalphabetic ciphers such as the Simple Substitution Cipher.