The entered text is automatically decrypted or encrypted using the entered key and alphabet including the modification.
You can choose between
A - ZZ - ASelf-defined
One of the following can be selected
J by IC by KW by VV
The output contains the decoded...
The entered text is automatically decrypted or encrypted with the key.
The following formats are available
TextBinary numbersHexadecimal numbersASCII valuesAutomatic recognition
The entered text is automatically decoded or encrypted.
The parameters of the Skytale are
Perimeter: number of characters per windingColumns: Number of windingsStrip width: number of characters next to each other
The entered text is automatically decrypted or encrypted according to the key.
Additionally, the generated key stream as well as the resulting sequence of the card game is calculated.
The entered text is automatically decrypted or encrypted and output.
Optionally, a one-time pad key can be used. This consists of 5-digit groups.
The entered text is encrypted with the selected key symbols.
These can be changed.
The entered text is automatically decrypted or encrypted according to the entered key.
There are two further options for the key
Autokey: xxxOffset A: xxx
The entered text is automatically decrypted or encrypted with the Tabula Recta of Trithemius and output.
As a variation, an offset can be specified for the key, which is xxx
After entering the cipher text, assumptions must be made about the key with regard to the length and the alphabet.
The presumed plaintext with the corresponding keyword is output.
The chances of success vary with the length of the cipher text and the length of the keyword. Several attempts...
The following parameters can be used to control decryption or encryption:
Straddling checkerboard - Wikipedia
The straddling checkerboard cipher was originally invented by the Argenti, the Pope's secretaries, in the 16th century. It was later also used by the Communists in the Spanish Civil War and by Soviet spies in WW2.
Another example is Che Guevara. When he was...
STASI Vernam Cipher Table “TAPIR” | RGP Communications Security (wordpress.com)
TAPIR is the name of a substitution table that was used in the National People's Army as well as the Ministry of State Security of the German Democratic Republic.
The resulting numbers were then re-encoded...
Tabula recta - Wikipedia
Johannes Trithemius (1462 - 1516) (actually: Johannes Heldenberg from Trittenheim) wrote the first printed book on cryptography, the "Polygraphiae libri sex" (Six Books on Polygraphy) in 1508, but it did not appear until 1518 after his death. In the fifth volume, he...
Vigenère cipher - Wikipedia
The Vigenère cipher is a manual key method dating from the 16th century. It is a monographic polyalphabetic substitution method.
The text is broken down into single characters and substituted using the key and Vigenère square. The Vigenère square consists of a...
The Morse code can be entered either directly in the text field, or by pressing the corresponding keys:Deleting is done by pressing
When the text is entered, the corresponding Morse code is automatically output.
Mexican Army Cipher Wheel - Decoder, Encoder, Solver, Translator (dcode.fr)
The Mexican Army Cipher Wheel is a polyalphabetic monographic substitution cipher.
The wheel consists of five discs, the position of which can be freely adjusted.
From the outside to the inside:
The Black Chamber - Homophonic Cipher (simonsingh.net)
After Arab scholars discovered that the individual letters in the plaintexts of natural languages occur with quite characteristic relative frequencies, Abu-Yusuf Ya'qub ibn Ishaq al-Kindi (800 - 873) succeeded in deciphering cryptograms...
Rail fence cipher - Wikipedia
The Railfence cipher - also called zig-zag or palisade cipher - is a transposition cipher.
The text is written in a defined depth (key) in zigzag.
For encryption, the text is written in lines one after the other. The order of the lines can be changed by an...
Johann Franz Graf von Gronsfeld-Bronkhorst (1640 - 1719) allegedly suggested to the writer and Jesuit priest Caspar Schott (1608 - 1666) on a journey from Mainz to Frankfurt the polyalphabetic monographic substitution cipher named after him today.Schott reported on this in 1665 in his Schola...
Enigma machine - Wikipedia
The Enigma (Greek aínigma, English "riddle", proper spelling also: ENIGMA) is a rotor key machine that was used during World War II to encrypt message traffic.
The inventor of the Enigma was Arthur Scherbius, whose first patent for it was dated February 23, 1918. In...
Copyright © 2023, GC Wizard. Proudly powered by WordPress. Blackoot design by Iceable Themes.