background preloader

Cipers and such

Facebook Twitter

Rubik's Cube Solver. Trifid Cipher. The Trifid Cipher is the Bifid Cipher taken to one more dimension.

Trifid Cipher

Instead of using a 5x5 Polybius Square, you use a 3x3x3 cube. Otherwise everything else remains the same. Baudot Paper Tape Code. This table presents a programmer's quick reference to the "Baudot" character set.

Baudot Paper Tape Code

Hollerith punched card. An 80-column punched card of the type most widely used in the 20th century. The size of the card was 7 3⁄8 in × 3 1⁄4 in (187.325 mm × 82.55 mm). This example displays the 1964 EBCDIC character set, which added more special characters to earlier encodings. A punched card, punch card, IBM card, or Hollerith card is a piece of stiff paper that contained either commands for controlling automated machinery or data for data processing applications. Both commands and data were represented by the presence or absence of holes in predefined positions. As of 2012, some voting machines still utilize punched cards to record data.[2] History[edit] Punched cards were first used around 1725 by Basile Bouchon and Jean-Baptiste Falcon (fr) as a more robust form of the perforated paper rolls then in use for controlling textile looms in France. Binary to Text (ASCII) Conversion. Binary to Text (ASCII) Conversion. Ascii Table - ASCII character codes and html, octal, hex and decimal chart conversion.

Freeware Hex Editor XVI32. [Overview] [Features] [What's New] [Screenshots] [User Reviews] [Download] [Installation] [Other Freeware] [Home] Overview XVI32 is a freeware hex editor running under Windows 9x/NT/2000/XP/Vista/7.

Freeware Hex Editor XVI32

The name XVI32 is derived from XVI, the roman notation for the number 16. XVI32 and all of its components are developed by myself. The current release 2.55 is available since June 26, 2012. Adyghe – ISO 9 transliteration system. Adyghe – ISO 9 transliteration system Adyghe virtual keyboard The Adyghe virtual keyboard allows you to enter characters with a click of your mouse.

Adyghe – ISO 9 transliteration system

There’s no need to change your keyboard layout anymore. Decabit-Impulsraster. Solve an Aristocrat or Patristocrat. Universal online Cyrillic decoder - recover your texts. Decabit-Impulsraster. Decrypting text. CrypTool-Online. The origins of modern cryptography date back approximately 3000 years.

CrypTool-Online

The procedures used to encrypt messages before 1900 were primitive compared to modern approaches, but they are easy to understand and provide a good basis to study the more complicated methods. In recent times, especially after the emergence of telecommunication equipment, more complex encryption methods have become necessary.

Today, an exorbitant amount of information is transmitted via the internet. Millions of people use websites for their banking activities causing the transmission of sensible data via networks where the precise routing of data is not always known and data may be manipulated or stolen. This website gives you the opportunity to learn about ciphers and to test them in an interactive way within your browser. Ciphers are popular for geocaching (www.geocaching.com, to provide hints for the ”treasure hunt“. Scytale Decoder. CrypTool-Online. Vigenere Variants. Introduction.

Vigenere Variants

Beaufort Cipher. Gronsfeld Cipher. Gronsfeld Cipher. Sharky's Vigenere Cipher. This page is for amusement only.

Sharky's Vigenere Cipher

Instructions are given below this form. instructions: Steganography_Decode - Utility Mill - Utility. Download Enigma Simulator. This software is an exact simulation of the 3-rotor Wehrmacht (Heer and Luftwaffe) Enigma, the 3-rotor Kriegsmarine M3, also called Funkschlussel M, and the famous 4-rotor Kriegmarine M4 Enigma cipher machine, used during World War II from 1939 until 1945.

Download Enigma Simulator

The sim has a very authentic feeling with its hands-on approach: you can select between the three models, actually lift out and insert different rotors, adjust their ring setting and set up the plugboard. The internal wiring of all rotors is identical to those that were used by the Wehrmacht and Kriegsmarine. This simulator is therefore fully compatible with the various real Enigma models and you can decrypt authentic wartime messages or encrypt and decrypt your own messages. The program comes with a very complete 22 page helpfile, containing the manual, some original messages, the history of Enigma and all technical details of the machine. Fialka M-125. Fialka M-125. Enigma Simulation. Enigma Simulation. Pigpen Cipher Variants. Pigpen Cipher Variants. Playfair Cipher.

ROT-X : Encryption/Decryption. Rot13.com. Cipher Statistics. Cipher Tools. Cryptography. When I wrote my first book, Fermat’s Last Theorem, I made a passing reference to the mathematics of cryptography.

Cryptography

Keyed Caesar. One variation to the standard Caesar cipher is when the alphabet is "keyed" by using a word.

Keyed Caesar

In the traditional variety, one could write the alphabet on two strips and just match up the strips after sliding the bottom strip to the left or right. To encode, you would find a letter in the top row and substitute it for the letter in the bottom row. For a keyed version, one would not use a standard alphabet, but would first write a word (omitting duplicated letters) and then write the remaining letters of the alphabet. For the example below, I used a key of "rumkin.com" and you will see that the period is removed because it is not a letter. You will also notice the second "m" is not included because there was an m already and you can't have duplicates.