Redefence

The Redefence Cipher is a variation of the classical Rail Fence Cipher that introduces a keyed permutation of rails. Instead of reading the zigzag rows in a fixed top-to-bottom order, the Redefence Cipher rearranges the order of the rails based on a numeric key. This adds an additional layer of transposition, making the cipher less predictable than the standard rail fence method.

Bazeries

The Bazeries Cipher is a classical encryption method that combines substitution and transposition techniques into a multi-stage process. It was developed by Étienne Bazeries, a French cryptographer, and is known for blending a keyed substitution alphabet (similar to the Playfair Cipher) with a numeric or keyword-driven transposition. This layered design makes it more complex than simple substitution or transposition ciphers alone.

Swagman

The Swagman Cipher is a classical polyalphabetic substitution cipher that encrypts plaintext using a repeating keyword to control shifts across letters. It operates similarly to a modified Vigenère cipher, but incorporates unique internal rules for letter substitution that can vary based on the implementation. The cipher aims to increase security over simple monoalphabetic systems by making each letter’s encoding dependent on its position and the keyword.

Disrupted Transposition

The Disrupted Transposition Cipher is a variation of the classical columnar transposition cipher that introduces irregular row filling to obscure structural patterns. Unlike standard transposition, where plaintext is written into a complete rectangular grid, the Disrupted Transposition Cipher intentionally “disrupts” the layout by filling rows unevenly based on a keyword pattern. This irregularity makes it more difficult to reconstruct the original grid during cryptanalysis.

Myszkowski Transposition

The Myszkowski Transposition Cipher is a variation of the classical columnar transposition cipher that introduces a unique handling of repeated letters in the key. Named after its Polish origin, this cipher modifies the standard columnar approach by allowing duplicate key letters to share the same column rank, resulting in a more nuanced and less predictable rearrangement of the plaintext.

Caesar Box

The Caesar Box Cipher is a classical transposition cipher that rearranges plaintext by placing it into a square or rectangular grid and then reading it out in a different order. Unlike the Caesar Cipher, which shifts letters within the alphabet, the Caesar Box Cipher preserves the original letters but alters their positions. This makes it a pure transposition cipher rather than a substitution cipher.

Double Transposition

The Double Transposition Cipher is a classical manual cipher that applies two consecutive columnar transpositions to a plaintext message. Unlike a simple columnar transposition, which rearranges letters using a single key, the Double Transposition Cipher uses two separate keys sequentially, providing significantly stronger diffusion and making frequency analysis more difficult. Each key determines the column order for its respective transposition stage.

VIC

The VIC Cipher is a complex hand cipher developed during the Cold War and used by Soviet intelligence operatives. Unlike simpler substitution or transposition ciphers, the VIC Cipher combines multiple cryptographic techniques into a layered system, including a Polybius-style checkerboard, modular arithmetic, and columnar transposition. This hybrid approach produces numeric ciphertext that is highly resistant to classical cryptanalysis when executed correctly.

ADFGVX

The ADFGVX Cipher is an extension of the ADFGX Cipher, designed during World War I by the German army to secure telegraphic communications. It combines a 6×6 Polybius square mapping letters and digits to pairs of symbols A, D, F, G, V, X, followed by a columnar transposition using a keyword. Compared to ADFGX, it adds support for digits (0–9), providing a 36-character alphabet and stronger diffusion across the ciphertext.

ADFGX

The ADFGX Cipher is a fractionating transposition cipher created by the German army during World War I. It converts each letter of plaintext into a pair of symbols chosen from A, D, F, G, X using a 5×5 Polybius square with a custom alphabet (merging I and J). After this substitution, the resulting pairs are rearranged using a columnar transposition keyed by a chosen word. This combination of fractionation and transposition makes the cipher significantly more secure than a simple substitution or basic columnar cipher.