✔CEASAR SHIFT / GRONSFELD CIPHER
Type: Substitution
> ceasar cipher or gronsfeld cipher is a type of encryption to which associated a shift of a fixed number of a letter (towards left or right). Each letter is then relaced by that obtained after performing the shift.
(Note: encoding or decoding depends on the number of shift)
Encrypt-shift forward
Decrypt-shift backward
Example:
Shift: 3
1.)LOVE
encrypted=ORYH
decrypted=ILSB
2.) JUHDW
encrypted=MXKGZ
decrypted=GREAT
✔CAESAR’S BOX
Example:
HBDY-AIAO-PRYU-PTT-YHO
(Note: arrange it like stack and read by column from top to bottom)
Stack form:
HBDY
AIAO
PRYU
PTT
YHO
Answer = HAPPY BIRTHDAY TO YOU
✔VANITY CODE
Type: Substitution
Keypad keys:
1=.,
2=abc
3=def
4=ghi
5=jkl
6=mno
7=pqrs
8=tuv
9=wxyz
0=space
Example:
356937 = flower
6676464 = morning
✔MORSE CODE
Type: Trasposition
> morse code is a system to encode thanks to short and long impulses. Each letter or punctuation mark is associated with a sequence of signals. These signals are translated to the following characters:
Dot(.) is the elementary pulse
Comma(,) represents pulse three times longer than the point
Space( ) represent separation between two letters
Vergule(/) represents separation between words
A= .-
B= -…
C= -.-.
D= -..
E= .
F= ..-.
G= –.
Η= ….
I= ..
J= .—
K= -.-
L= .-..
M= —
N= -.
O= —
P= .–.
Q= –.-
R= .-.
S= …
T= –
U= ..-
V= …-
W= .–
X= -..-
Y= -.–
Z= –..
Example:
-.-. — -. -.. .. – .. — -. = CONDITION
✔KEYWORD CIPHER
Type: Substitution
(Note: encoding or decoding is based on the keyword input)
(Note: keyword given will be inserted as first in the sequence of alphabet and letters should never repeat)
Example
Keyword: GOD
A=G N=M
B=O O=N
C=D P=P
D=A Q=Q
E=B R=R
F=C S=S
G=E T=T
H=F U=U
I=H V=V
J=I W=W
K=J X=X
L=K Y=Y
M=L Z=Z
Cipher: JMNW = KNOW
✔ROT 13
> ROT13 (“rotate by 13 places”, sometimes hyphenated ROT-13) is a simple letter substitution cipher that replaces a letter with the letter 13 letters after it in the alphabet.
Type:
A=Z
B=Y
C=X
D=W
E=V
F=U
G=T
H=S
I=R
J=Q
K=P
L=O
M=N
✔BACON CIPHER
Type: Substitution
> To encode a message, each letter of the plaintext is replaced by a group of five of the letters ‘A’ or ‘B’. This replacement is a binary encoding and is done according to the alphabet of the Baconian cipher.
A=AAAAA
B=AAAAB
C=AAABA
D=AAABB
E=AABAA
F=AABAB
G=AABBA
H=AABBB
I/J=ABAAA
K=
ABABA
L=ABABB
M=ABBAA
N=ABBAB
O=ABBBA
P=ABBBB
Q=BAAAA
R=BAAAB
S=BAABA
T=BAABB
U/V=BABAA
W=BABBA
X=BABBB
Y=BBAAA
Z=BBAAB
✔REVERSE CIPHER
Types: Words
> two modes are available in this code. First reverses the whole text, second reverses letters word by word.
Example:
1st mode
1.) NEGYXO = OXYGEN
2.) YRANOITCID = DICTIONARY
3.)1ST: REKEES NOITNETTA = ATTENTION SEEKER
4.)2nd: NOITNETTA REKEES = ATTENTION SEEKER
✔PLAYFAIR
Type: Substitution
> playfair cipher uses an array of 5×5 containing a keyword or phrase. The first step is to create a grid based on the key. The second step is to encrypt the letters of the message by selecting them in pairs.
Key: melons
(Note: grid size is 5×5 and i/j can interchange)
M|E|L|O|N
S|A|B|C|D
F|G|H|I |K
P|Q|R|T|U
V|W|X|Y|Z
Plaintext: VALENTINES
VA LE NT IN ES
Ciphertext: WSOLOUJOMA
WS OL OU JO MA
Credits to him (JB)
