Arnold Cipher
The Arnold Cipher was a book cipher used by John André and Benedict Arnold during the negotiations that led to Arnold's failed attempt to surrender West Point to the British in 1780.
In May 1779, ...
Arnold Cipher - Wikipedia
Copiale cipher
The Copiale cipher is an encrypted manuscript consisting of 75,000 handwritten characters filling 105 pages in a bound volume. Originally thought to date between 1760 and 1780, it was later found to d...
Copiale cipher - Wikipedia
Atbash
Atbash (also transliterated Atbaš) is a simple substitution cipher for the Hebrew alphabet. It consists in substituting aleph (the first letter) for tav (the last), beth (the second) for shin (one bef...
Affine cipher
The affine cipher is a type of monoalphabetic substitution cipher, wherein each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted...
Affine cipher - Wikipedia
Lorenz cipher
The Lorenz SZ40, SZ42A and SZ42B were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz AG in Berlin. The model name SZ was derived fro...
Lorenz cipher - Wikipedia
E0 (cipher)
E0 is a stream cipher used in the Bluetooth protocol. It generates a sequence of pseudorandom numbers and combines it with the data using the XOR operator. The key length may vary, but is generally 12...
High-bandwidth Digital Content Protection
High-bandwidth Digital Content Protection (HDCP), is a form of digital copy protection developed by Intel Corporation to prevent copying of digital audio and video content as it travels across connect...
DRYAD
The DRYAD Numeral Cipher/Authentication System (KTC 1400 D) is a simple, paper cryptographic system employed by the U.S. military for authentication and for encryption of short, numerical messages. E...
DRYAD - Wikipedia
F-FCSR
In cryptography, F-FCSR is a stream cipher developed by Thierry Berger, François Arnault, and Cédric Lauradoux. The core of the cipher is a Feedback with Carry Shift Register (FCSR) automaton, which...
F-FCSR - Wikipedia
Enigma machine
An Enigma machine was any of several electro-mechanical rotor cipher machines used in the twentieth century for enciphering and deciphering secret messages. Enigma was invented by the German engineer ...
Enigma machine - Wikipedia
Āryabhaṭa numeration
The Āryabhaṭa numeration is a system of numerals based on Sanskrit phonemes. It was introduced in the early 6th century by Āryabhaṭa, in the first chapter titled Gītika Padam of his Aryabhatiya. I...
Alphabetum Kaldeorum
The Alphabetum Kaldeorum is one of the best known ciphers of the Middle Ages. Its name refers to the Chaldees, whose inhabitants during the medieval era were reputed to have mysterious and magical kno...
Alphabetum Kaldeorum - Wikipedia
RC4
In cryptography, RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is the most widely used software stream cipher and is used in popular Internet protocols such as Tra...
SOBER-128
SOBER-128 is a synchronous stream cipher designed by Hawkes and Rose (2003) and is a member of the SOBER family of ciphers. SOBER-128 was also designed to provide MAC (Message authentication code) fun...
A5/1
A5/1 is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. It is one of seven algorithms which were specified for GSM use. It was initially kep...
A5/1 - Wikipedia
Enigma rotor details
This article contains technical details about the rotors of the Enigma machine.Understanding the way the machine encrypts requires taking into account the current position of each rotor, the ring sett...
Enigma rotor details - Wikipedia
Phelix
Phelix is a high-speed stream cipher with a built-in single-pass message authentication code (MAC) functionality, submitted in 2004 to the eSTREAM contest by Doug Whiting, Bruce Schneier, Stefan Lucks...
Gilbert Vernam
Gilbert Sandford Vernam (3 April 1890 – 7 February 1960) was a Worcester Polytechnic Institute 1914 graduate and AT&T Bell Labs engineer who, in 1917, invented an additive polyalphabetic str...
Gilbert Vernam - Wikipedia
A5/2
A5/2 is a stream cipher used to provide voice privacy in the GSM cellular telephone protocol. It was used for export instead of the relatively stronger (but still weak) A5/1. It is one of seven A5 cip...
Rasterschlüssel 44
Rasterschlüssel 44 (RS 44) was a manual cipher system, used by the German Wehrmacht during the Second World War. The cipher was introduced in March 1944 and Allied forces codebreakers had considerable...
Alberti cipher
The Alberti Cipher was one of the first polyalphabetic ciphers.Created in the 15th century (1466/67), it was the peak of cryptography at that time. Its inventor was Leon Battista Alberti, an illegitim...
Alberti cipher - Wikipedia
Autokey cipher
An autokey cipher (also known as the autoclave cipher) is a cipher which incorporates the message (the plaintext) into the key. There are two forms of autokey cipher: key autokey and text autokey ciph...
Autokey cipher - Wikipedia
Content Scramble System
Content Scramble System (CSS) is a digital rights management (DRM) and encryption system employed on almost all commercially produced DVD-Video discs. CSS utilizes a proprietary 40-bit stream cipher a...
Cryptanalysis of the Enigma
Cryptanalysis of the Enigma enabled the western Allies in World War II to read substantial amounts of secret Morse-coded radio communications of the Axis powers that had been enciphered using Enigma m...
Cryptanalysis of the Enigma - Wikipedia
Fluhrer, Mantin and Shamir attack
In cryptography, the Fluhrer, Mantin and Shamir attack is a particular stream cipher attack, a dedicated form of cryptanalysis for attacking the widely used stream cipher RC4. The attack allows an att...