Stylesheet Cipher
The Stylesheet cipher is a layered substitution system inspired by cascading logic rather than mechanical encryption devices. Instead of applying a single rigid transformation, the cipher applies ordered visual rules to plaintext, allowing the message to be manipulated in structured passes. Each rule modifies the text according to position, character class, or pattern. When multiple rules overlap, precedence determines the final result.
T9 AKA Phone Code
The T9 / Phone Code Cipher is based on the multi-tap input method used on traditional numeric keypads. Each digit key corresponds to multiple letters, and the number of presses determines which letter is selected. Spaces between words are preserved.
NATO Phonetic Alphabet
The NATO Phonetic Alphabet, also known as the International Radiotelephony Spelling Alphabet, is a standardized set of code words used to represent the letters A–Z. Developed and adopted by NATO in 1956, it ensures clear communication over radio, telephone, and other voice channels where mishearing letters could have critical consequences. Each letter is assigned a unique word, such as A → Alfa, B → Bravo, C → Charlie, minimizing confusion due to similar-sounding letters.
Zodiac Cipher
The Zodiac Cipher refers to a set of ciphers used by the infamous Zodiac Killer in the late 1960s to send encrypted messages to newspapers and authorities in Northern California. These ciphers combine substitution, symbols, and, in some cases, simple transposition, creating challenging puzzles that drew widespread attention from cryptographers and amateur sleuths alike.
Tap Code
The Tap Code Cipher is a substitution cipher that encodes letters based on their position in a 5x5 Polybius square, typically combining the letters I and J. Each letter is represented by two numbers: the row and column where it appears in the square. These numbers are then expressed as a series of taps, with the number of taps indicating the row and column.
Patristic Cipher
The Patristic Cipher is a letter-substitution format where the plaintext is first encrypted using a keyword-based substitution (like a keyed alphabet) and then formatted into uniform blocks (commonly 5 letters each). Spaces, punctuation, and other non-letter characters are removed so that the ciphertext appears as a continuous stream of letters, hiding word boundaries.
Patristic Cipher: Encoding
Plaintext message:
HELLO WORLDStep 1: Clean the text
Remove spaces and non-alphabet characters:
Nihilist Cipher
The Nihilist Cipher is a polygraphic substitution cipher that combines the principles of the Polybius Square with a numeric key to produce a series of ciphertext numbers. It was developed in the 19th century by Russian nihilists to securely transmit messages, hence its name. Each letter is first converted into a pair of digits using a Polybius grid, then combined with corresponding digits from a numeric key by addition, resulting in ciphertext that appears as a sequence of numbers.
M-94 Cipher
The M-94 Cipher is a mechanical cipher system developed by the U.S. Army in 1922, using 25 rotating disks, each engraved with a scrambled alphabet. Messages are encoded by arranging the disks in a predetermined order and reading the ciphertext from a selected row. Each disk acts as a simple substitution cipher, but the combination of multiple disks creates a polyalphabetic substitution.
Letter Number Substitution
The Letter Number Substitution cipher is a simple substitution system in which each letter of the alphabet is replaced by its corresponding numeric position. For example, A=1, B=2, …, Z=26. This cipher is sometimes called the A1Z26 Cipher and is one of the most straightforward methods to convert letters to numbers for encoding messages.
Jefferson Disk Cipher
The Jefferson Disk Cipher, invented by Thomas Jefferson in the late 18th century, is a polyalphabetic substitution cipher that uses a set of rotating disks, each marked with a scrambled alphabet. Each disk represents a cipher alphabet, and by aligning the disks in a chosen sequence, the plaintext is encoded by selecting a row from the disks. This system effectively produces a complex, polyalphabetic cipher resistant to simple frequency analysis.