Pinprick Cipher
The Pinprick Cipher is a basic and straightforward form of secret writing, often used for encoding messages in a discreet manner. It involves using a pin or a sharp tool to create small holes or dots on a piece of paper in a specific pattern to represent letters, numbers, or symbols.
To use the Pinprick Cipher, each letter, digit, or symbol in the plaintext is assigned a unique pattern of holes or dots. The pattern could be based on a predefined code, a secret key, or any agreed-upon method between the sender and recipient.
Null Cipher
The Null Cipher, also known as the Null Encryption or Null Message, is a simplistic cryptographic technique where specific letters or symbols are deliberately left blank or null in a message. Instead of using complex algorithms or substitutions, the Null Cipher relies on the absence of characters to convey hidden information.
Grid Transposition Cipher
The Grid Transposition Cipher is a method of encryption that involves rearranging the characters of a message based on a predetermined grid pattern. It is a type of transposition cipher, where the original letters of the plaintext are maintained, but their positions are altered to create the ciphertext.
Combination Cipher
A Combination Cipher, also known as a Mixed Alphabet Cipher, is a type of encryption technique that combines elements of different encryption methods. It is a substitution cipher where each character in the plaintext is replaced by a character from a different alphabet or set of symbols.
The Combination Cipher typically involves multiple encryption steps using different substitution rules or alphabets. This creates a more complex and secure encryption scheme by combining the strengths of different cipher techniques.
Columnar Cipher
The Columnar cipher, also called the Columnar transposition cipher, is a classical cipher method used since at least the 16th century. Instead of substituting letters, it encrypts messages by rearranging their positions according to a key. The key is usually a word, and its letters determine the columns in which the plaintext is written row by row. Encryption then reads the columns in the order the key letters appear in the original key, rather than alphabetically, which affects the final ciphertext.