Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Substitution cipher

Index Substitution cipher

In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. [1]

132 relations: ADFGVX cipher, Affine cipher, Al-Qalqashandi, American Cryptogram Association, American Megatrends, Atbash, Babington Plot, Beatrix Potter, Beaufort cipher, Bifid cipher, Block cipher, Books on cryptography, Bop It, Bullet (DC Thomson), Caesar cipher, Chaocipher, Churning (cipher), Cipher, Cipher Department of the High Command of the Wehrmacht, Cipher disk, Ciphertext, Classical cipher, Code (cryptography), Copiale cipher, Crossword, Cryptanalysis, Cryptanalysis of the Enigma, Cryptanalysis of the Lorenz cipher, Cryptogram, Cryptography, Dorothy Hill, DRYAD, Dvorak encoding, Edgar Allan Poe, Encryption, Enigma machine, Farfallino alphabet, Fay ki Boli, Ferdinand Voegele, Fish (cryptography), Francesco I Gonzaga, Francis Beaufort, Frequency analysis, Fringe (TV series), Fritz Menzer, Fuck, Futurama, General der Nachrichtenaufklärung, German tank problem, Giambattista della Porta, ..., Gnommish, Gravity Falls, Great Cipher, Grill (cryptology), Grille (cryptography), Gronsveld, Gumball (video game), Hermann Fictuld, History of cryptography, Homophony (disambiguation), Hundreds (video game), Ibn al-Durayhim, Imaginary Day, Index of coincidence, Index of cryptography articles, Interlac, Isis Adventure, Jeremiah 25, Kasiski examination, Keyword cipher, Known-plaintext attack, Leet, List of cryptographers, List of formal language and literal string topics, List of permutation topics, M-209, Malbolge, Minbari, Mister Mind and the Monster Society of Evil, National Cipher Challenge, No Warning (web series), Noah John Rondeau, Null cipher, Numbers (season 3), Nyctography, Outline of cryptography, Pearson hashing, Permutation, Permutation box, Philip Johnston (code talker), Pigpen cipher, Playfair cipher, Polyalphabetic cipher, Polybius square, Product cipher, Rasterschlüssel 44, Research Office of the Reich Air Ministry, Reservehandverfahren, Reverse engineering, Room 40, Rossignols, ROT13, Rotor machine, Running key cipher, S-box, Secret decoder ring, Sherlock Holmes and the Secret Weapon, Sid Meier's Covert Action, Spira (Final Fantasy), String operations, Substitution, Substitution cipher, Substitution–permutation network, Sukhotin's algorithm, The Adventure of the Dancing Men, The Da Vinci Code (video game), The Gold-Bug, The Radio Hacker's Codebook, Theban alphabet, Timeline of algorithms, Timeline of computing hardware before 1950, Timeline of cryptography, Transliteration, Transposition cipher, Trifid cipher, Trigraph, Unicity distance, VEST, VIC cipher, Voynich manuscript, Zygmunt Kaczkowski, 05:22:09:12 Off. Expand index (82 more) »

ADFGVX cipher

In cryptography, the ADFGVX cipher was a field cipher used by the German Army on the Western Front during World War I. ADFGVX was in fact an extension of an earlier cipher called ADFGX.

New!!: Substitution cipher and ADFGVX cipher · See more »

Affine cipher

The affine cipher is a type of monoalphabetic substitution cipher, wherein each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted back to a letter.

New!!: Substitution cipher and Affine cipher · See more »

Al-Qalqashandi

Shihab al-Din abu 'l-Abbas Ahmad ben Ali ben Ahmad Abd Allah al-Qalqashandi (1355 or 1356 – 1418) was a medieval Egyptian writer and mathematician.

New!!: Substitution cipher and Al-Qalqashandi · See more »

American Cryptogram Association

The American Cryptogram Association (ACA) is an American non-profit organization devoted to the hobby of cryptography, with an emphasis on types of codes, ciphers, and cryptograms that can be solved either with pencil and paper, or with computers, but not computer-only systems.

New!!: Substitution cipher and American Cryptogram Association · See more »

American Megatrends

American Megatrends Incorporated (AMI) is an American hardware and software company, specializing in PC hardware and firmware.

New!!: Substitution cipher and American Megatrends · See more »

Atbash

Atbash (אתבש; also transliterated Atbaš) is a monoalphabetic substitution cipher originally used to encrypt the Hebrew alphabet.

New!!: Substitution cipher and Atbash · See more »

Babington Plot

The Babington Plot was a plan in 1586 to assassinate Queen Elizabeth I, a Protestant, and put Mary, Queen of Scots, her Roman Catholic cousin, on the English throne.

New!!: Substitution cipher and Babington Plot · See more »

Beatrix Potter

Helen Beatrix Potter (British English, North American English also, 28 July 186622 December 1943) was an English writer, illustrator, natural scientist, and conservationist best known for her children's books featuring animals, such as those in The Tale of Peter Rabbit.

New!!: Substitution cipher and Beatrix Potter · See more »

Beaufort cipher

The Beaufort cipher, created by Sir Francis Beaufort, is a substitution cipher similar to the Vigenère cipher, with a slightly modified enciphering mechanism and tableau.

New!!: Substitution cipher and Beaufort cipher · See more »

Bifid cipher

In classical cryptography, the bifid cipher is a cipher which combines the Polybius square with transposition, and uses fractionation to achieve diffusion.

New!!: Substitution cipher and Bifid cipher · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: Substitution cipher and Block cipher · See more »

Books on cryptography

Books on cryptography have been published sporadically and with highly variable quality for a long time.

New!!: Substitution cipher and Books on cryptography · See more »

Bop It

Bop It toys are a line of audio games where play consists of following a series of commands issued through speakers by the toy, which has multiple inputs including pressable buttons, pull handles, twisting cranks, spinnable wheels, flickable switches - with pace speeding up as the player progresses.

New!!: Substitution cipher and Bop It · See more »

Bullet (DC Thomson)

Bullet was a comic book published weekly in the UK during the 1970s.

New!!: Substitution cipher and Bullet (DC Thomson) · See more »

Caesar cipher

E in the plaintext becomes B in the ciphertext.

New!!: Substitution cipher and Caesar cipher · See more »

Chaocipher

The Chaocipher is a cipher method invented by J. F. Byrne in 1918 and described in his 1953 autobiographical Silent Years.

New!!: Substitution cipher and Chaocipher · See more »

Churning (cipher)

Churning is an encryption function used to scramble downstream user data of the ATM passive optical network system defined by the ITU G.983.1 standard.

New!!: Substitution cipher and Churning (cipher) · See more »

Cipher

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

New!!: Substitution cipher and Cipher · See more »

Cipher Department of the High Command of the Wehrmacht

The Cipher Department of the High Command of the Wehrmacht (Amtsgruppe Wehrmachtnachrichtenverbindungen, Abteilung Chiffrierwesen) (also Oberkommando der Wehrmacht Chiffrierabteilung or Chiffrierabteilung of the High Command of the Wehrmacht or Chiffrierabteilung of the OKW or OKW/Chi or Chi) was the Signal Intelligence Agency of the Supreme Command of the Armed Forces of the German Armed Forces before and during World War II.

New!!: Substitution cipher and Cipher Department of the High Command of the Wehrmacht · See more »

Cipher disk

A cipher disk is an enciphering and deciphering tool developed in 1470 by the Italian architect and author Leon Battista Alberti.

New!!: Substitution cipher and Cipher disk · See more »

Ciphertext

In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher.

New!!: Substitution cipher and Ciphertext · See more »

Classical cipher

In cryptography, a classical cipher is a type of cipher that was used historically but now has fallen, for the most part, into disuse.

New!!: Substitution cipher and Classical cipher · See more »

Code (cryptography)

Cryptography in simple terms means the use of any alphabet or numerical statement which has a meaning or stores a message.

New!!: Substitution cipher and Code (cryptography) · See more »

Copiale cipher

The Copiale cipher is an encrypted manuscript consisting of 75,000 handwritten characters filling 105 pages in a bound volume.

New!!: Substitution cipher and Copiale cipher · See more »

Crossword

A crossword is a word puzzle that usually takes the form of a square or a rectangular grid of white-and black-shaded squares.

New!!: Substitution cipher and Crossword · See more »

Cryptanalysis

Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.

New!!: Substitution cipher and Cryptanalysis · See more »

Cryptanalysis of the Enigma

Cryptanalysis of the Enigma ciphering system enabled the western Allies in World War II to read substantial amounts of Morse-coded radio communications of the Axis powers that had been enciphered using Enigma machines.

New!!: Substitution cipher and Cryptanalysis of the Enigma · See more »

Cryptanalysis of the Lorenz cipher

Cryptanalysis of the Lorenz cipher was the process that enabled the British to read high-level German army messages during World War II.

New!!: Substitution cipher and Cryptanalysis of the Lorenz cipher · See more »

Cryptogram

A cryptogram is a type of puzzle that consists of a short piece of encrypted text.

New!!: Substitution cipher and Cryptogram · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: Substitution cipher and Cryptography · See more »

Dorothy Hill

Dorothy Hill, AC, CBE, FAA, FRS (10 September 1907 – 23 April 1997) was an Australian geologist and palaeontologist, the first female professor at an Australian university, and the first female president of the Australian Academy of Science.

New!!: Substitution cipher and Dorothy Hill · See more »

DRYAD

The DRYAD Numeral Cipher/Authentication System (KTC 1400 D) is a simple, paper cryptographic system employed by the U.S. military for authentication and for encryption of short, numerical messages.

New!!: Substitution cipher and DRYAD · See more »

Dvorak encoding

Dvorak encoding is a type of encoding based on the differences in layout of a QWERTY keyboard and a Dvorak keyboard.

New!!: Substitution cipher and Dvorak encoding · See more »

Edgar Allan Poe

Edgar Allan Poe (born Edgar Poe; January 19, 1809 – October 7, 1849) was an American writer, editor, and literary critic.

New!!: Substitution cipher and Edgar Allan Poe · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Substitution cipher and Encryption · See more »

Enigma machine

The Enigma machines were a series of electro-mechanical rotor cipher machines developed and used in the early- to mid-20th century to protect commercial, diplomatic and military communication.

New!!: Substitution cipher and Enigma machine · See more »

Farfallino alphabet

The farfallino alphabet (in Italian alfabeto farfallino) is a language game used primarily in Italy, which can be regarded as an elementary form of substitution cipher.

New!!: Substitution cipher and Farfallino alphabet · See more »

Fay ki Boli

Fay Kee Bolee (ف کی بولی, lit. Fay Language) is a language game used by Urdu-speaking people in Pakistan.

New!!: Substitution cipher and Fay ki Boli · See more »

Ferdinand Voegele

Ferdinand Voegele (born 12 February 1896 in Hollfeld, Kingdom of Bavaria; died after 1946) was a German philologist and linguistic cryptanalyst, before and during the time of World War II and who would eventually lead the cipher bureau, okl-stelle (German: Chiffrier Stelle) of the Luftwaffe Signal Intelligence Service (German: Oberbefehlshaber der Luftwaffe) (Abbr. Luftwaffe SIS).

New!!: Substitution cipher and Ferdinand Voegele · See more »

Fish (cryptography)

Fish (sometimes FISH) was the UK's GC&CS Bletchley Park codename for any of several German teleprinter stream ciphers used during World War II.

New!!: Substitution cipher and Fish (cryptography) · See more »

Francesco I Gonzaga

Portrait of Francesco I Gonzaga Francesco I Gonzaga (1366 – 7 March 1407) was ruler of Mantua from 1382 to 1407.

New!!: Substitution cipher and Francesco I Gonzaga · See more »

Francis Beaufort

Rear Admiral Sir Francis Beaufort, KCB, FRS, FRGS, FRAS, MRIA (27 May 1774 – 17 December 1857) was an Irish hydrographer and officer in the Royal Navy.

New!!: Substitution cipher and Francis Beaufort · See more »

Frequency analysis

In cryptanalysis, frequency analysis is the study of the frequency of letters or groups of letters in a ciphertext.

New!!: Substitution cipher and Frequency analysis · See more »

Fringe (TV series)

Fringe is an American science fiction television series created by J. J. Abrams, Alex Kurtzman, and Roberto Orci.

New!!: Substitution cipher and Fringe (TV series) · See more »

Fritz Menzer

Ostwin Fritz Menzer (* 6 April 1908 in Herrndorf near Niederschöna in Saxony between Chemnitz and Dresden † died 25 October 2005 in Bad Homburg vor der Höhe) was a German cryptologist, who before and during World War II, worked in the In 7/VI, the Wehrmacht signals intelligence agency, later working in (OKW/ Chi) that was the cipher bureau of the supreme command of the Nazi party, and later in Abwehr, the military intelligence service of the Wehrmacht, and was involved in the development and production of cryptographic devices and procedures, as well as the security control of their own methods.

New!!: Substitution cipher and Fritz Menzer · See more »

Fuck

Fuck is an obscene English-language word, which often refers to the act of sexual intercourse but is also commonly used as an intensifier or to denote disdain.

New!!: Substitution cipher and Fuck · See more »

Futurama

Futurama is an American animated sitcom created by Matt Groening for the Fox Broadcasting Company.

New!!: Substitution cipher and Futurama · See more »

General der Nachrichtenaufklärung

The GdNA (Oberkommando des Heeres/General der Nachrichtenaufklärung) was the signals intelligence agency of the Wehrmacht, before and during World War II.

New!!: Substitution cipher and General der Nachrichtenaufklärung · See more »

German tank problem

In the statistical theory of estimation, the German tank problem consists in estimating the maximum of a discrete uniform distribution from sampling without replacement.

New!!: Substitution cipher and German tank problem · See more »

Giambattista della Porta

Giambattista della Porta (1535? – 4 February 1615), also known as Giovanni Battista Della Porta, was an Italian scholar, polymath and playwright who lived in Naples at the time of the Scientific Revolution and Reformation.

New!!: Substitution cipher and Giambattista della Porta · See more »

Gnommish

Gnommish is the "fairy language" used in the ''Artemis Fowl'' series by Eoin Colfer.

New!!: Substitution cipher and Gnommish · See more »

Gravity Falls

Gravity Falls is an American animated television series produced by Disney Television Animation originally for Disney Channel (and then later for Disney XD) from June 15, 2012, to February 15, 2016.

New!!: Substitution cipher and Gravity Falls · See more »

Great Cipher

In the history of cryptography, the Great Cipher or Grand Chiffre was a nomenclator cipher developed by the Rossignols, several generations of whom served the French Crown as cryptographers.

New!!: Substitution cipher and Great Cipher · See more »

Grill (cryptology)

The grill method (metoda rusztu), in cryptology, was a method used chiefly early on, before the advent of the cyclometer, by the mathematician-cryptologists of the Polish Cipher Bureau (Biuro Szyfrów) in decrypting German Enigma machine ciphers.

New!!: Substitution cipher and Grill (cryptology) · See more »

Grille (cryptography)

In the history of cryptography, a grille cipher was a technique for encrypting a plaintext by writing it onto a sheet of paper through a pierced sheet (of paper or cardboard or similar).

New!!: Substitution cipher and Grille (cryptography) · See more »

Gronsveld

Gronsveld (Groêselt or Groéselt) is a village in the Dutch province of Limburg.

New!!: Substitution cipher and Gronsveld · See more »

Gumball (video game)

Gumball is a 1983 video game by Veda Hlubinka-Cook (born Robert Cook) and Broderbund in which the player controls the valves of a maze-like machine to sort gumballs by their color.

New!!: Substitution cipher and Gumball (video game) · See more »

Hermann Fictuld

Hermann Fictuld (c. 14 January 1700 – c. 1777) was a pseudonym used by an early Freemason, whose identity has not been definitely determined.

New!!: Substitution cipher and Hermann Fictuld · See more »

History of cryptography

Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago.

New!!: Substitution cipher and History of cryptography · See more »

Homophony (disambiguation)

Homophony and Homophonic are from the Greek ὁμόφωνος (homóphōnos), literally 'same-sounding,' from ὁμός (homós), "same" and φωνή (phōnē), "sound".

New!!: Substitution cipher and Homophony (disambiguation) · See more »

Hundreds (video game)

Hundreds is a mobile puzzle video game where players touch circles to make them grow without overlapping.

New!!: Substitution cipher and Hundreds (video game) · See more »

Ibn al-Durayhim

ʻAlī ibn Muḥammad Ibn al-Durayhim (ابن الدريهم; 1312–1359/62 CE) was an Arab cryptologist who gave detailed descriptions of eight cipher systems that discussed substitution ciphers, leading to the earliest suggestion of a "tableau" of the kind that two centuries later became known as the "Vigenère table".

New!!: Substitution cipher and Ibn al-Durayhim · See more »

Imaginary Day

Imaginary Day is an album by the Pat Metheny Group, released in 1997 by Warner Bros. Records.

New!!: Substitution cipher and Imaginary Day · See more »

Index of coincidence

In cryptography, coincidence counting is the technique (invented by William F. Friedman) of putting two texts side-by-side and counting the number of times that identical letters appear in the same position in both texts.

New!!: Substitution cipher and Index of coincidence · See more »

Index of cryptography articles

Articles related to cryptography include.

New!!: Substitution cipher and Index of cryptography articles · See more »

Interlac

Interlac is the designated communication language of the 30th century United Planets in the DC Comics fictional universe.

New!!: Substitution cipher and Interlac · See more »

Isis Adventure

Isis Adventure is a series of puzzle games presented by Sonic Games, a Shropshire-based business.

New!!: Substitution cipher and Isis Adventure · See more »

Jeremiah 25

Jeremiah 25 is the twenty-fifth chapter of the Book of Jeremiah in the Hebrew Bible or the Old Testament of the Christian Bible.

New!!: Substitution cipher and Jeremiah 25 · See more »

Kasiski examination

In cryptanalysis, Kasiski examination (also referred to as Kasiski's test or Kasiski's method) is a method of attacking polyalphabetic substitution ciphers, such as the Vigenère cipher.

New!!: Substitution cipher and Kasiski examination · See more »

Keyword cipher

A keyword cipher is a form of monoalphabetic substitution.

New!!: Substitution cipher and Keyword cipher · See more »

Known-plaintext attack

The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext).

New!!: Substitution cipher and Known-plaintext attack · See more »

Leet

Leet (or "1337"), also known as eleet or leetspeak, is a system of modified spellings and verbiage used primarily on the Internet for many phonetic languages.

New!!: Substitution cipher and Leet · See more »

List of cryptographers

List of cryptographers.

New!!: Substitution cipher and List of cryptographers · See more »

List of formal language and literal string topics

This is a list of formal language and literal string topics, by Wikipedia page.

New!!: Substitution cipher and List of formal language and literal string topics · See more »

List of permutation topics

This is a list of topics on mathematical permutations.

New!!: Substitution cipher and List of permutation topics · See more »

M-209

In cryptography, the M-209, designated CSP-1500 by the United States Navy (C-38 by the manufacturer) is a portable, mechanical cipher machine used by the US military primarily in World War II, though it remained in active use through the Korean War.

New!!: Substitution cipher and M-209 · See more »

Malbolge

Malbolge is a public domain esoteric programming language invented by Ben Olmstead in 1998, named after the eighth circle of hell in Dante's Inferno, the Malebolge.

New!!: Substitution cipher and Malbolge · See more »

Minbari

The Minbari are a fictional alien race featured in the television show Babylon 5.

New!!: Substitution cipher and Minbari · See more »

Mister Mind and the Monster Society of Evil

Mister Mind is a fictional character, a comic book supervillain created for Fawcett Comics, and now owned and published by DC Comics.

New!!: Substitution cipher and Mister Mind and the Monster Society of Evil · See more »

National Cipher Challenge

The National Cipher Challenge is an annual cryptographic competition organised by the University of Southampton School of Mathematics.

New!!: Substitution cipher and National Cipher Challenge · See more »

No Warning (web series)

No Warning is a Science Fiction drama concerning the struggle of the Nexus, humanity's last hope, against the ancient Fraternity of the Eternal Brotherhood, who are beginning to emerge after a long period in hiding.

New!!: Substitution cipher and No Warning (web series) · See more »

Noah John Rondeau

Noah John Rondeau (July 6, 1883 – August 24, 1967) was a widely known hermit in the High Peaks of the Adirondack Mountains of New York State.

New!!: Substitution cipher and Noah John Rondeau · See more »

Null cipher

A null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material.

New!!: Substitution cipher and Null cipher · See more »

Numbers (season 3)

Season three of Numbers, an American television series, premiered on September 22, 2006 with the episode "Spree" and had its season finale "The Janus List" on May 18, 2007.

New!!: Substitution cipher and Numbers (season 3) · See more »

Nyctography

Nyctography is a form of substitution cipher writing created by Lewis Carroll (Charles Lutwidge Dodgson) in 1891.

New!!: Substitution cipher and Nyctography · See more »

Outline of cryptography

The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information.

New!!: Substitution cipher and Outline of cryptography · See more »

Pearson hashing

Pearson hashing is a hash function designed for fast execution on processors with 8-bit registers.

New!!: Substitution cipher and Pearson hashing · See more »

Permutation

In mathematics, the notion of permutation relates to the act of arranging all the members of a set into some sequence or order, or if the set is already ordered, rearranging (reordering) its elements, a process called permuting.

New!!: Substitution cipher and Permutation · See more »

Permutation box

In cryptography, a permutation box (or P-box) is a method of bit-shuffling used to permute or transpose bits across S-boxes inputs, retaining diffusion while transposing.

New!!: Substitution cipher and Permutation box · See more »

Philip Johnston (code talker)

Philip Johnston (September 17, 1892 in Topeka, Kansas – September 11, 1978 in San Diego, California) proposed the idea of using the Navajo language as a Navajo code to be used in the Pacific during World War II.

New!!: Substitution cipher and Philip Johnston (code talker) · See more »

Pigpen cipher

The pigpen cipher (alternately referred to as the masonic cipher, Freemason's cipher, Napoleon cipher, and tic-tac-toe cipher)Barker, p. 40Wrixon, p. 27 is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid.

New!!: Substitution cipher and Pigpen cipher · See more »

Playfair cipher

The Playfair cipher or Playfair square or Wheatstone-Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher.

New!!: Substitution cipher and Playfair cipher · See more »

Polyalphabetic cipher

A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets.

New!!: Substitution cipher and Polyalphabetic cipher · See more »

Polybius square

In cryptography, the Polybius square, also known as the Polybius checkerboard, is a device invented by the Ancient Greeks Cleoxenus and Democleitus, and perfected by the Ancient Greek historian and scholar Polybius, for fractionating plaintext characters so that they can be represented by a smaller set of symbols.

New!!: Substitution cipher and Polybius square · See more »

Product cipher

In cryptography, a product cipher combines two or more transformations in a manner intending that the resulting cipher is more secure than the individual components to make it resistant to cryptanalysis.

New!!: Substitution cipher and Product cipher · See more »

Rasterschlüssel 44

Rasterschlüssel 44 (abbr. RS 44) was a manual cipher system, used by the German Wehrmacht during the Second World War.

New!!: Substitution cipher and Rasterschlüssel 44 · See more »

Research Office of the Reich Air Ministry

The Research Office of the Reich Air Ministry (German: RLM/Forschungsamt (FA), English: "Research Bureau") was the signals intelligence and cryptanalytic agency of the German Nazi Party from 1933 to 1945.

New!!: Substitution cipher and Research Office of the Reich Air Ministry · See more »

Reservehandverfahren

Reservehandverfahren (RHV) (Reserve Hand Procedure) was a German Naval World War II hand-cipher system used as a backup method when no working Enigma machine was available.

New!!: Substitution cipher and Reservehandverfahren · See more »

Reverse engineering

Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to scientific research, the only difference being that scientific research is about a natural phenomenon.

New!!: Substitution cipher and Reverse engineering · See more »

Room 40

In the history of cryptanalysis, Room 40, also known as 40 O.B. (Old Building) (latterly NID25) was the section in the British Admiralty most identified with the British cryptanalysis effort during the First World War, in particular the interception and decoding of the Zimmermann Telegram which played a role in bringing the United States into the War.

New!!: Substitution cipher and Room 40 · See more »

Rossignols

The Rossignols, a family of French cryptographers and cryptanalysts, included.

New!!: Substitution cipher and Rossignols · See more »

ROT13

ROT13 ("rotate by 13 places", sometimes hyphenated ROT-13) is a simple letter substitution cipher that replaces a letter with the 13th letter after it, in the alphabet.

New!!: Substitution cipher and ROT13 · See more »

Rotor machine

In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting secret messages.

New!!: Substitution cipher and Rotor machine · See more »

Running key cipher

In classical cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream.

New!!: Substitution cipher and Running key cipher · See more »

S-box

In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution.

New!!: Substitution cipher and S-box · See more »

Secret decoder ring

A secret decoder ring (or secret decoder) is a device which allows one to decode a simple substitution cipher - or to encrypt a message by working in the opposite direction.

New!!: Substitution cipher and Secret decoder ring · See more »

Sherlock Holmes and the Secret Weapon

Sherlock Holmes and the Secret Weapon (1942) is the fourth in the Basil Rathbone/Nigel Bruce series of 14 Sherlock Holmes films which updated the characters created by Sir Arthur Conan Doyle to the present day.

New!!: Substitution cipher and Sherlock Holmes and the Secret Weapon · See more »

Sid Meier's Covert Action

Sid Meier's Covert Action is an action and strategy video game developed and released in 1990 by MicroProse for the PC DOS and Amiga.

New!!: Substitution cipher and Sid Meier's Covert Action · See more »

Spira (Final Fantasy)

Spira is the fictional world of the Square role-playing video games Final Fantasy X and Final Fantasy X-2.

New!!: Substitution cipher and Spira (Final Fantasy) · See more »

String operations

In computer science, in the area of formal language theory, frequent use is made of a variety of string functions; however, the notation used is different from that used for computer programming, and some commonly used functions in the theoretical realm are rarely used when programming.

New!!: Substitution cipher and String operations · See more »

Substitution

Substitution may refer to.

New!!: Substitution cipher and Substitution · See more »

Substitution cipher

In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth.

New!!: Substitution cipher and Substitution cipher · See more »

Substitution–permutation network

In cryptography, an SP-network, or substitution–permutation network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES (Rijndael), 3-Way, Kuznyechik, PRESENT, SAFER, SHARK, and Square.

New!!: Substitution cipher and Substitution–permutation network · See more »

Sukhotin's algorithm

Sukhotin's algorithm (introduced by Boris V. Sukhotin) is a statistical classification algorithm for classifying characters in a text as vowels or consonants.

New!!: Substitution cipher and Sukhotin's algorithm · See more »

The Adventure of the Dancing Men

"The Adventure of the Dancing Men", a Sherlock Holmes story written by British author Sir Arthur Conan Doyle, is one of 13 stories in the cycle published as The Return of Sherlock Holmes.

New!!: Substitution cipher and The Adventure of the Dancing Men · See more »

The Da Vinci Code (video game)

The Da Vinci Code is a 2006 adventure puzzle video game developed by The Collective, Inc. and published by 2K Games for PlayStation 2, Xbox and Microsoft Windows.

New!!: Substitution cipher and The Da Vinci Code (video game) · See more »

The Gold-Bug

"The Gold-Bug" is a short story by Edgar Allan Poe published in 1843.

New!!: Substitution cipher and The Gold-Bug · See more »

The Radio Hacker's Codebook

The Radio Hacker's Codebook is a book for computer enthusiasts written by George Sassoon.

New!!: Substitution cipher and The Radio Hacker's Codebook · See more »

Theban alphabet

The Theban alphabet is a writing system with unknown origins which first came into publication in the 16th century.

New!!: Substitution cipher and Theban alphabet · See more »

Timeline of algorithms

The following timeline outlines the development of algorithms (mainly "mathematical recipes") since their inception.

New!!: Substitution cipher and Timeline of algorithms · See more »

Timeline of computing hardware before 1950

This article presents a detailed timeline of events in the history of computing hardware: from prehistory until 1949.

New!!: Substitution cipher and Timeline of computing hardware before 1950 · See more »

Timeline of cryptography

Below is a timeline of notable events related to cryptography.

New!!: Substitution cipher and Timeline of cryptography · See more »

Transliteration

Transliteration is a type of conversion of a text from one script to another that involves swapping letters (thus trans- + liter-) in predictable ways (such as α → a, д → d, χ → ch, ն → n or æ → e).

New!!: Substitution cipher and Transliteration · See more »

Transposition cipher

In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext.

New!!: Substitution cipher and Transposition cipher · See more »

Trifid cipher

The trifid cipher is a classical cipher invented by Félix Delastelle and described in 1902.

New!!: Substitution cipher and Trifid cipher · See more »

Trigraph

Trigraph may refer to.

New!!: Substitution cipher and Trigraph · See more »

Unicity distance

In cryptography, unicity distance is the length of an original ciphertext needed to break the cipher by reducing the number of possible spurious keys to zero in a brute force attack.

New!!: Substitution cipher and Unicity distance · See more »

VEST

VEST (Very Efficient Substitution Transposition) ciphers are a set of families of general-purpose hardware-dedicated ciphers that support single pass authenticated encryption and can operate as collision-resistant hash functions designed by Sean O'Neil, Benjamin Gittins and Howard Landman.

New!!: Substitution cipher and VEST · See more »

VIC cipher

The VIC cipher was a pencil and paper cipher used by the Soviet spy Reino Häyhänen, codenamed "VICTOR".

New!!: Substitution cipher and VIC cipher · See more »

Voynich manuscript

The Voynich manuscript is an illustrated codex hand-written in an unknown writing system.

New!!: Substitution cipher and Voynich manuscript · See more »

Zygmunt Kaczkowski

Zygmunt Kaczkowski (1825–1896) was a Polish writer, independence activist and an Austrian spy.

New!!: Substitution cipher and Zygmunt Kaczkowski · See more »

05:22:09:12 Off

05:22:09:12 Off is an album by Industrial/EBM group Front 242.

New!!: Substitution cipher and 05:22:09:12 Off · See more »

Redirects here:

Cipher language, Homophonic cipher, Homophonic substitution cipher, Letter-substitution cipher, Monoalphabetic cipher, Monoalphabetic substitution, Monoalphabetic substitution cipher, Nomenclator cipher, Replacement cipher, Simple substitution, Simple substitution cipher, Substitution alphabet, Substitution ciphers, Substitution cryptography, Substitution cypher, Substitutions ciphers.

References

[1] https://en.wikipedia.org/wiki/Substitution_cipher

OutgoingIncoming
Hey! We are on Facebook now! »