|
|
|
needs to be made. |
|
Atabash cipher
|
The atabash cipher is a simple substitution cipher with the code shown in reverse order. Showing the Alphabet it becomes:
|
Atabash cipher |
a |
b |
c |
d |
e |
f |
g |
h |
i |
j |
k |
l |
m |
n |
o |
p |
q |
r |
s |
t |
u |
v |
w |
x |
y |
z |
z |
y |
x |
w |
v |
u |
t |
s |
r |
q |
p |
o |
n |
m |
l |
k |
j |
i |
h |
g |
f |
e |
d |
c |
b |
a |
|
|
|
Caesar cipher
|
The Caesar cipher, Caesar rotation, or simply Rot, is named after Julius Caesar, who used it to communicate with his soldiers.
The encryption operates by replacing it with a predetermined offset. Each letter of the actual text In rot3 (shift
three), the letter A is replaced by the letter D. (See Table)
|
Caesar cipher (Rot3) |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
|
In this cipher the Rot13 key is special. Original and coded letter are reciprocal.
|
Rot13 |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
|
|
Affine cipher
|
The affine cipher is a simple code in which the characters of the text are replaced by the encrypted values??. The key is a
mathematical calculation (ax + b) mod (26) in which the variable x is filled with (a = 0, b = 1, c = 2, etc). For A always take an odd number.
mod (26) mathematics: "Take of 26, as often as possible. Do this until you get a value out of wich you can not take 26 anymore.
"example: 28mod26 = 2 and 2mod26 = 2 br>.
In the table below, respectively, the standard alphabet, the letter value, Letter value after calculation, coded letter for A = 1 and B = 6
|
Affine cipher voor A=1 en B=6 |
a |
b |
c |
d |
e |
f |
g |
h |
i |
j |
k |
l |
m |
n |
o |
p |
q |
r |
s |
t |
u |
v |
w |
x |
y |
z |
0 |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
0 |
1 |
2 |
3 |
4 |
5 |
g |
h |
i |
j |
k |
l |
m |
n |
o |
p |
q |
r |
s |
t |
u |
v |
w |
x |
y |
z |
a |
b |
c |
d |
e |
f |
|
The key for the code A=1 and B=6 as shown above, is
De sleutel voor de de code A=1 en B=6 zoals hier boven te zien is, is actually very simple. When a message is affine-coded with A = 5,
B = 3 then you should be able togenerate the key as shown below.
|
Affine cipher for A=5 en B=3 |
a |
b |
c |
d |
e |
f |
g |
h |
i |
j |
k |
l |
m |
n |
o |
p |
q |
r |
s |
t |
u |
v |
w |
x |
y |
z |
0 |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
5 |
8 |
11 |
14 |
17 |
20 |
23 |
0 |
3 |
6 |
9 |
12 |
15 |
18 |
21 |
24 |
1 |
4 |
7 |
10 |
13 |
16 |
19 |
22 |
25 |
2 |
f |
i |
l |
o |
r |
u |
x |
a |
d |
g |
j |
m |
p |
s |
v |
y |
b |
e |
h |
k |
n |
q |
t |
w |
z |
c |
|
|
|
ADFGVX cipher
|
The original cipher, the ADFGX-cipher has been made by a German named Fritz Nebel (German officer during the First World War) it was taken
in service just befor the Spring offensive (1918). During the offensive the letter V was added (ADFGVX) and a new variant was made. In the same
the "unbreakable" code got broken by the French, wich gave them a big lead. Breaking the encryption was officially kept secret until 1966.
The letters ADFGVX are chosen becouse the are very different in morse code.
Befor you can start coding, you need to choose two passwords. In our example, we use "scouting festival" and "kabouter" (It's Dutch for scouting festival and gnome).
Coded text is "voorbeeld van www sherpaz nl" (This is again Dutch and means example by www.sherpaz.nl).
We start by removing all double letters from the first one (scouting festival) and fill it with the rest of the aplphabet. The numbers get placed
immediately after their letter (A 1, B 2 etc.....) br>
In the table you see Codewoord, Codeword without doubles, and remaining alphabet with numbers.
Added in the following table or the codeword codeword without duplicate values?and remaining alphabet with numbers. 
|
ADFGVX codeword 01 |
s |
c |
o |
u |
t |
i |
n |
g |
f |
e |
s |
t |
i |
v |
a |
l |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
s |
c |
o |
u |
t |
i |
n |
g |
f |
e |
|
|
|
v |
a |
l |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
s |
c |
3 |
o |
u |
t |
i |
9 |
n |
g |
7 |
f |
6 |
e |
5 |
v |
a |
1 |
l |
b |
2 |
d |
4 |
h |
8 |
j |
0 |
k |
m |
p |
q |
r |
w |
x |
y |
z |
|
The result can now be placed, as shown below in the ADFGVX - grid
|
|
A |
D |
F |
G |
V |
X |
A |
s |
c |
3 |
o |
u |
t |
D |
i |
9 |
n |
g |
7 |
f |
F |
6 |
e |
5 |
v |
a |
1 |
G |
l |
b |
2 |
d |
4 |
h |
V |
8 |
j |
0 |
k |
m |
p |
X |
q |
r |
w |
x |
y |
z |
|
You are noow ready to translate the text (voorbeeld van www sherpaz nl)
First you take the numbers of the row followed by the number of the column, after translation you get:
FG AG AG XD GD FD FD GA GG FG FV DF XF XF XF AA GX FD XD VX FV XX DF GA
After translating we can start coding, write down the second code-word (kabouter) and see in what order the letters appear in
alphabet (dthe first two lines in table). Write down the characters of the translation as shown in the remainder of the table.
|
K |
A |
B |
O |
U |
T |
E |
R |
4 |
1 |
2 |
5 |
8 |
7 |
3 |
6 |
F |
G |
A |
G |
A |
G |
X |
D |
G |
D |
F |
D |
F |
D |
G |
A |
G |
G |
F |
G |
F |
V |
D |
F |
X |
F |
X |
F |
X |
F |
A |
A |
G |
X |
F |
D |
X |
D |
V |
X |
F |
V |
X |
X |
D |
F |
G |
A |
|
Now we can read the text according to the numbering of each column, of wich we divide the results into groups of five.
GDGFX-VAFFX-FXXGD-AVGFG-GXGFG-DGFDX-DAFAX-AGDVF-DFAFF-XXD
IMPORTANT: In the example, the last table, coincidentally, is completely filled. If (nl = DF GA) had not been in the post, there would have
four empty boxes remained. In this case you need to trace back how many characters there are in the message, before you can decode backwards. |
|
Bacon cipher
|
The Bacon cipher is a way to hide a message in an innocent-looking text document. Each letter gets a display consisting of five
symbols. Using two different symbols.
The key is in the table below. The symbols are shown in this example, with an A and a B. In the coded messages, the
A referres to the italic letters and the B to the plain text.
|
Bacon cipher |
a |
b |
c |
d |
e |
f |
g |
h |
AAAAA |
AAAAB |
AAABA |
AAABB |
AABAA |
AABAB |
AABBA |
AABBB |
i-j |
k |
l |
m |
n |
o |
p |
q |
ABAAA |
ABAAB |
ABABA |
ABABB |
ABBAA |
ABBAB |
ABBBA |
ABBBB |
r |
s |
t |
u-v |
w |
x |
y |
z |
BAAAA |
BAAAB |
BAABA |
BAABB |
BABAA |
BABAB |
BABBA |
BABBB |
|
Example:
Om de schat te kunnen vinden begin je op kaartcoordinaat 218,88-224.80
als je nu bacon eet, vind je HIER OOK DE VOLGENDE AANWIJZING.
Wich is dutch for: (To find the treasure you start on coördinate 218,88-224.80, By eating Bacon you will allso fing the next Clue)
The decoded message says (Lambertmeting).
ABABA=l, AAAAA=a,
ABABB=m, AAAAB=b,
AABAA=e,
BAAAA=r,
BAABA=t,
ABABB=m,
AABAA=e,
BAABA=t,
ABAAA=i,
ABBAA=n,
AABBA=g
Conclusion:
The coördinate 218,88-224,80 is a Lambert-coördinate (Belgium grid). Measure it out and you will find yourself on RD 152.90-371.07 (Holland). |
|
Vigenère cipher
|
The Vigenère cipher was invented by Giovanni Batista Bellaso in 1553, but it was Blaise de Vigenère which announced the figure.
By combining a codeword with the table below, the code arises. (Example below the table)
|
Vigenère cipher table |
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
B |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
C |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
D |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
E |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
F |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
G |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
H |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
I |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
J |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
K |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
L |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
M |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
N |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
O |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
P |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
Q |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
R |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
S |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
T |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
U |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
V |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
W |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
X |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
Y |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Z |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
|
First, choose a secret code word. In the example we take SCOUTING. You write this under the text you wich to encode. Repeat until you have two
letters everywhere. Example "Dit is super geheim" (again Dutch meaning: This is super secret).
Reading the character to be coded from the
vertical table and the letter of the code word from the horizontal table. (The bottom line in the table shows the results show.) Read the letter
wich you want to be coded vertically and the letter from the codeword horizontally.
Kies eerst een geheim codewoord. In het voorbeeld nemen we hiervoor SCOUTING. Dit schrijf je net zo lang onder de te coderen tekst tot de
volledige, te coderen tekst uit twee letters bestaat. In het voorbeeld gaan we "Dit is super geheim" coderen. Lees de te coderen letter uit de
verticale tabel en de letter uit het codewoord uit de horizontale tabel. (The bottom line in the table shows the results show.)
|
D |
I |
T |
I |
S |
S |
U |
P |
E |
R |
G |
E |
H |
E |
I |
M |
S |
C |
O |
U |
T |
I |
N |
G |
S |
C |
O |
U |
T |
I |
N |
G |
V |
K |
H |
C |
L |
A |
H |
V |
W |
T |
U |
Y |
A |
M |
V |
S |
|
|
|
|