Map Cipher

The Map Cipher, also known as the Route Cipher or Matrix Cipher, is a method of encryption that involves rearranging characters of a message according to a predefined route or pattern on a grid or map. It is a type of transposition cipher, where the original letters of the plaintext are preserved, but their order is changed to create the ciphertext.

Keyboard Code

Keyboard Code, also known as Keyboard Cipher or Keyboard Encryption, is a simple and straightforward method of encrypting and decrypting messages using a keyboard layout as a reference. It is a type of substitution cipher, where each letter of the plaintext is replaced with a corresponding letter from the keyboard layout.

Homophonic Substitution Cipher

The Homophonic Substitution cipher is a classical substitution cipher designed to replace each plaintext character with one of several possible ciphertext symbols, reducing the effectiveness of frequency analysis. While its exact origins are unclear, it became widely studied in the 16th and 17th centuries and was employed in diplomatic and military communications to obscure letter frequencies. In this cipher, high-frequency letters like E or T are assigned multiple ciphertext equivalents, while less frequent letters may have only one.

Hill Cipher

The Hill cipher is a polygraphic substitution cipher invented by the American mathematician Lester S. Hill in 1929. Unlike simple substitution ciphers, the Hill cipher encrypts blocks of letters using linear algebra, making it one of the first ciphers to apply matrix operations to cryptography. Each block of plaintext letters is represented as a vector of numbers (with A=0, B=1, …, Z=25) and multiplied by an invertible key matrix modulo 26.

Gronsfeld Cipher

The Gronsfeld Cipher is a variation of the Vigenère cipher, attributed to the German mathematician Johann Gronsfeld, who introduced it in 1863. It was primarily developed as a method for encrypting messages using a numeric key, making it a simpler form of the more complex Vigenère cipher.

Foursquare Cipher

The Foursquare cipher is a polygraphic substitution cipher developed by F. A. Wheatstone in 1890. In this three-key variation, four 5×5 matrices are used: the top-left matrix is filled with the letters of Key 1 followed by the remaining alphabet, the top-right matrix uses Key 2, the bottom-left matrix uses Key 3, and the bottom-right matrix contains the standard alphabet in order. Encryption works on digraphs (two-letter pairs) of plaintext.

Digraph Cipher

The Digraph cipher, often associated with the Playfair cipher developed by Charles Wheatstone in 1854, is a digraph substitution cipher that encrypts pairs of letters instead of single letters, increasing security over simple monoalphabetic ciphers. A 5×5 matrix is created using a keyword, in this case KEY, filling in the remaining letters of the alphabet in order (typically merging I and J into one cell). The plaintext is split into digraphs (two-letter pairs), padding with a filler letter like X if needed.

Dice Cipher

A Dice Cipher, also known as a Dice Cryptography or a Book Cipher, is a cryptographic technique that uses dice as a randomization tool to generate a series of numbers that correspond to words or characters in a pre-selected reference book. It is a form of polyalphabetic substitution cipher.

Here's a general overview of how a Dice Cipher works: