Knowledge (XXG)

Cipher

Source 📝

32: 440: 340: 225:, and this limited advances in mathematics. In this transition, the word was adopted into Medieval Latin as cifra, and then into Middle French as cifre. This eventually led to the English word cipher (minority spelling cypher). One theory for how the term came to refer to encoding is that the concept of zero was confusing to Europeans, and so the term came to refer to a message or communication that was not easily understood. 397:) which changed the substitution alphabet for every letter. For example, "GOOD DOG" can be encrypted as "PLSX TWF" where "L", "S", and "W" substitute for "O". With even a small amount of known or estimated plaintext, simple polyalphabetic substitution ciphers and letter transposition ciphers designed for pen and paper encryption are easy to crack. It is possible to create a secure pen and paper cipher based on a 89: 1549: 212:). If the algorithm is symmetric, the key must be known to the recipient and sender and to no one else. If the algorithm is an asymmetric one, the enciphering key is different from, but closely related to, the deciphering key. If one key cannot be deduced from the other, the asymmetric key algorithm has the public/private key property and one of the keys may be made public without loss of confidentiality. 409:, several rotor disks provided polyalphabetic substitution, while plug boards provided another substitution. Keys were easily changed by changing the rotor disks and the plugboard wires. Although these encryption methods were more complex than previous schemes and required machines to encrypt and decrypt, other machines such as the British 186:). The encrypting procedure is varied depending on the key, which changes the detailed operation of the algorithm. A key must be selected before using a cipher to encrypt a message. Without knowledge of the key, it should be extremely difficult, if not impossible, to decrypt the resulting ciphertext into readable plaintext. 486:
Computational power available, i.e., the computing power which can be brought to bear on the problem. It is important to note that average performance/capacity of a single computer is not the only factor to consider. An adversary can use multiple computers at once, for instance, to increase the speed
154:
Codes generally substitute different length strings of characters in the output, while ciphers generally substitute the same number of characters as are input. A code maps one meaning with another. Words and phrases can be coded as letters or numbers. Codes typically have direct meaning from input to
456:
In a symmetric key algorithm (e.g., DES and AES), the sender and receiver must have a shared key set up in advance and kept secret from all other parties; the sender uses this key for encryption, and the receiver uses the same key for decryption. The design of AES (Advanced Encryption System) was
375:). For example, "GOOD DOG" can be encrypted as "PLLX XLP" where "L" substitutes for "O", "P" for "G", and "X" for "D" in the message. Transposition of the letters "GOOD DOG" can result in "DGOGDOO". These simple ciphers and examples are easy to crack, even without plaintext-ciphertext pairs. 265:(meaning Chinese characters in Japanese) characters to supplement the native Japanese characters representing syllables. An example using English language with Kanji could be to replace "The quick brown fox jumps over the lazy dog" by "The quick brown 狐 jumps 上 the lazy 犬". 246:
In casual contexts, "code" and "cipher" can typically be used interchangeably; however, the technical usages of the words refer to different concepts. Codes contain meaning; words and phrases are assigned to numbers or symbols, creating a shorter message.
457:
beneficial because it aimed to overcome the flaws in the design of the DES (Data encryption standard). AES's designer's claim that the common means of modern cipher cryptanalytic attacks are ineffective against AES due to its design structure.
351:
is one of the earliest known cryptographic systems. Julius Caesar used a cipher that shifts the letters in the alphabet in place by three and wrapping the remaining letters to the front to write to Marcus Tullius Cicero in approximately 50 BC.
272:
Ciphers, on the other hand, work at a lower level: the level of individual letters, small groups of letters, or, in modern schemes, individual bits and blocks of bits. Some systems used both codes and ciphers in one system, using
162:
which linked a random string of characters or numbers to a word or phrase. For example, "UQJHSE" could be the code for "Proceed to the following coordinates." When using a cipher the original information is known as
404:
During the early twentieth century, electro-mechanical machines were invented to do encryption and decryption using transposition, polyalphabetic substitution, and a kind of "additive" substitution. In
221:
Originating from the Arabic word for zero صفر (sifr), the word "cipher" spread to Europe as part of the Arabic numeral system during the Middle Ages. The Roman numeral system lacked the concept of
155:
key. Codes primarily function to save time. Ciphers are algorithmic. The given input must follow the cipher's process to be solved. Ciphers are commonly used to encrypt written information.
1529: 1359: 171:. The ciphertext message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it. 232:
was later also used to refer to any Arabic digit, or to calculation using them, so encoding text in the form of Arabic numerals is literally converting the text to "ciphers".
989: 530:
proved, using information theory considerations, that any theoretically unbreakable cipher must have keys which are at least as long as the plaintext, and used only once:
910:. 2005 13th IEEE International Conference on Networks, Jointly held with the 2005 IEEE 7th Malaysia International Conference on Communication. Vol. 2. Kuala Lumpur: 1119: 837: 261:
Another example is given by whole word ciphers, which allow the user to replace an entire word with a symbol or character, much like the way written Japanese utilizes
971: 1008: 1212: 331:
are substantially different from modern methods, and modern ciphers can be classified according to how they operate and whether they use one or two keys.
296:
Historically, cryptography was split into a dichotomy of codes and ciphers, while coding had its own terminology analogous to that of ciphers: "
379: 1165: 1133: 813: 53: 1089: 597: 728: 1205: 1097: 1022: 947: 884: 713: 75: 979: 675: 251: 1038: 1408: 254:
which was used to shorten long telegraph messages which resulted from entering into commercial contracts using exchanges of
147:", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially 482:
In a pure mathematical attack, (i.e., lacking any other information to help break a cipher) two factors above all count:
1198: 143:. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with " 1524: 1479: 1292: 521: 390: 46: 40: 1403: 1181: 1519: 1004: 319:. Because of this, codes have fallen into disuse in modern cryptography, and ciphers are the dominant technique. 57: 1509: 1499: 1354: 445: 432: 209: 139:—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is 1504: 1494: 1297: 1257: 1250: 1240: 1235: 449: 428: 328: 205: 20: 1245: 866: 421:
Modern encryption methods can be divided by two criteria: by type of key used, and by type of input data.
148: 1577: 1552: 1398: 1344: 497:, i.e., the size of key used to encrypt a message. As the key size increases, so does the complexity of 615:"Vt hkskdkxt: Early Medieval Cryptography, Textual Errors, and Scribal Agency (Speculum, forthcoming)" 1514: 1438: 1014: 368: 100: 92: 1277: 933: 558: 553: 360: 241: 144: 1383: 1367: 1314: 1063: 1055: 965: 876: 795: 783: 642: 634: 175: 439: 394: 339: 1443: 1433: 1304: 1161: 1129: 1115: 1093: 1018: 953: 943: 880: 854: 819: 809: 709: 593: 498: 488: 383: 372: 274: 1582: 1378: 1047: 937: 915: 846: 805: 775: 626: 356: 1103: 890: 735: 174:
The operation of a cipher usually depends on a piece of auxiliary information, called a
1453: 1373: 1334: 1282: 1267: 1081: 799: 568: 543: 527: 88: 1571: 1534: 1489: 1448: 1428: 1324: 1287: 1262: 646: 563: 470: 406: 348: 327:
There are a variety of different types of encryption. Algorithms used earlier in the
312: 198: 108: 1067: 787: 505:
Since the desired effect is computational difficulty, in theory one would choose an
1484: 1329: 1319: 1309: 1272: 1221: 1149: 1051: 984: 701: 548: 531: 517: 464: 398: 194: 116: 96: 870: 1033: 1463: 1125: 766: 104: 904: 1423: 1393: 1388: 1349: 919: 779: 168: 136: 132: 858: 823: 764:
Al-Kadi, Ibrahim A. (1992). "Origins of Cryptology: The Arab Contributions".
1413: 1157: 957: 506: 266: 164: 128: 894: 1107: 850: 516:
which uses multiple reports to suggest that a symmetrical cipher with 128
1458: 1418: 494: 355:
Historical pen and paper ciphers used in the past are sometimes known as
316: 255: 159: 1010:
The Ciphers of the Monks: A Forgotten Number-notation of the Middle Ages
638: 311:
However, codes have a variety of drawbacks, including susceptibility to
1059: 801:
GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency
501:
to the point where it becomes impractical to crack encryption directly.
460:
Ciphers can be distinguished into two types by the type of input data:
509:
and desired difficulty level, thus decide the key length accordingly.
1339: 676:"English Civil War cipher belonging to Cromwell ally goes on display" 614: 382:, developed ciphers to send coded messages to his allies during the 204:
By whether the same key is used for both encryption and decryption (
630: 452:), where two different keys are used for encryption and decryption. 193:
By whether they work on blocks of symbols usually of a fixed size (
438: 410: 364: 338: 262: 87: 911: 590:
The Muslim Next Door: The Qur'an, the Media, and That Veil Thing
435:), where one same key is used for encryption and decryption, and 1194: 179: 25: 1034:"Cryptology: From Caesar Ciphers to Public-key Cryptosystems" 513: 1121:
Cryptography and Network Security: Principles and Practices
269:
sometimes use specific symbols to abbreviate whole words.
222: 189:
Most modern ciphers can be categorized in several ways:
906:
Heuristic Cryptanalysis of Classical and Modern Ciphers
524:
with 256 bits, all have similar difficulty at present.
1360:
Cryptographically secure pseudorandom number generator
902:
Ho, Yean Li; Samsudin, Azman; Belaton, Bahari (2005).
491:
for a key (i.e., "brute force" attack) substantially.
1186: 158:
Codes operated by substituting according to a large
1472: 1228: 343:
Visual representation of how Caesar's Cipher works.
16:
Algorithm for encrypting and decrypting information
903: 520:, an asymmetric cipher with 3072 bit keys, and an 277:to increase the security. In some cases the terms 1086:Elementary Cryptanalysis: A Mathematical Approach 413:were invented to crack these encryption methods. 467:, which encrypt block of data of fixed size, and 831:Caldwell, William Casey (2022). "Shakespeare's 939:The Codebreakers – The Story of Secret Writing 424:By type of key used ciphers are divided into: 1206: 378:In the 1640s, the Parliamentarian commander, 8: 838:SEL: Studies in English Literature 1500–1900 315:and the difficulty of managing a cumbersome 512:An example of this process can be found at 473:, which encrypt continuous streams of data. 208:), or if a different key is used for each ( 1213: 1199: 1191: 1187: 1032:Luciano, Dennis; Prichett, Gordon (1987). 970:: CS1 maint: location missing publisher ( 1090:Mathematical Association of America Press 729:"Communication Theory of Secrecy Systems" 197:), or on a continuous stream of symbols ( 76:Learn how and when to remove this message 39:This article includes a list of general 592:. White Cloud Press. pp. 240–241. 580: 963: 401:, but these have other disadvantages. 380:Edward Montagu, 2nd Earl of Manchester 7: 103:. Also includes runically unrelated 706:Cryptogtaphy / Theory and Practice 45:it lacks sufficient corresponding 14: 1154:Cryptography: Theory and Practice 1548: 1547: 1152:; Paterson, Maura (2023-01-09). 875:(Corrected ed.). New York: 389:Simple ciphers were replaced by 30: 1039:The College Mathematics Journal 992:from the original on 2024-01-17 1409:Information-theoretic security 1052:10.1080/07468342.1987.11973000 942:(Revised ed.). New York. 613:Saltzman, Benjamin A. (2018). 1: 835:and the Ciphers of History". 588:Ali-Karamali, Sumbul (2008). 99:resembling that found on the 167:, and the encrypted form as 1525:Message authentication code 1480:Cryptographic hash function 1293:Cryptographic hash function 391:polyalphabetic substitution 285:are used synonymously with 1601: 1404:Harvest now, decrypt later 478:Key size and vulnerability 250:An example of this is the 239: 18: 1543: 1520:Post-quantum cryptography 1190: 920:10.1109/ICON.2005.1635595 780:10.1080/0161-119291866801 708:, CRC Press, p. 45, 660:Janeczko, Paul B (2004). 446:asymmetric key algorithms 252:commercial telegraph code 210:asymmetric key algorithms 1510:Quantum key distribution 1500:Authenticated encryption 1355:Random number generation 433:Private-key cryptography 429:symmetric key algorithms 206:symmetric key algorithms 1505:Public-key cryptography 1495:Symmetric-key algorithm 1298:Key derivation function 1258:Cryptographic primitive 1251:Authentication protocol 1241:Outline of cryptography 1236:History of cryptography 1150:Stinson, Douglas Robert 450:Public-key cryptography 329:history of cryptography 60:more precise citations. 21:Cipher (disambiguation) 1246:Cryptographic protocol 796:Aldrich, Richard James 443: 359:. They include simple 344: 149:classical cryptography 112: 1399:End-to-end encryption 1345:Cryptojacking malware 851:10.1353/sel.2022.0003 522:elliptic curve cipher 442: 393:ciphers (such as the 369:transposition ciphers 342: 91: 1515:Quantum cryptography 1439:Trusted timestamping 1015:Franz Steiner Verlag 914:. pp. 710–715. 867:Gaines, Helen Fouché 361:substitution ciphers 178:(or, in traditional 101:Kensington Runestone 19:For other uses, see 1278:Cryptographic nonce 980:"Ciphers vs. codes" 702:Stinson, Douglas R. 559:List of ciphertexts 554:Encryption software 242:Code (cryptography) 1384:Subliminal channel 1368:Pseudorandom noise 1315:Key (cryptography) 1116:Stallings, William 877:Dover Publications 444: 345: 113: 107:writing style and 1565: 1564: 1561: 1560: 1444:Key-based routing 1434:Trapdoor function 1305:Digital signature 1167:978-1-032-47604-9 1135:978-0-13-670722-6 815:978-0-00-727847-3 499:exhaustive search 489:exhaustive search 384:English Civil War 373:Rail Fence Cipher 357:classical ciphers 275:superencipherment 86: 85: 78: 1590: 1551: 1550: 1379:Insecure channel 1215: 1208: 1201: 1192: 1188: 1171: 1156:(6th ed.). 1145: 1143: 1142: 1124:(8th ed.). 1111: 1077: 1075: 1074: 1028: 1000: 998: 997: 975: 969: 961: 929: 927: 926: 909: 898: 862: 827: 806:HarperCollins UK 791: 751: 750: 748: 746: 740: 734:. Archived from 733: 725: 719: 718: 698: 692: 691: 689: 687: 672: 666: 665: 657: 651: 650: 610: 604: 603: 585: 293:, respectively. 81: 74: 70: 67: 61: 56:this article by 47:inline citations 34: 33: 26: 1600: 1599: 1593: 1592: 1591: 1589: 1588: 1587: 1568: 1567: 1566: 1557: 1539: 1468: 1224: 1219: 1178: 1168: 1148: 1140: 1138: 1136: 1114: 1100: 1082:Sinkov, Abraham 1080: 1072: 1070: 1031: 1025: 1003: 995: 993: 978: 962: 950: 932: 924: 922: 901: 887: 865: 830: 816: 794: 763: 760: 755: 754: 744: 742: 741:on June 5, 2007 738: 731: 727: 726: 722: 716: 700: 699: 695: 685: 683: 674: 673: 669: 659: 658: 654: 612: 611: 607: 600: 587: 586: 582: 577: 540: 480: 419: 337: 325: 244: 238: 219: 131:for performing 82: 71: 65: 62: 52:Please help to 51: 35: 31: 24: 17: 12: 11: 5: 1598: 1597: 1594: 1586: 1585: 1580: 1570: 1569: 1563: 1562: 1559: 1558: 1556: 1555: 1544: 1541: 1540: 1538: 1537: 1532: 1530:Random numbers 1527: 1522: 1517: 1512: 1507: 1502: 1497: 1492: 1487: 1482: 1476: 1474: 1470: 1469: 1467: 1466: 1461: 1456: 1454:Garlic routing 1451: 1446: 1441: 1436: 1431: 1426: 1421: 1416: 1411: 1406: 1401: 1396: 1391: 1386: 1381: 1376: 1374:Secure channel 1371: 1365: 1364: 1363: 1352: 1347: 1342: 1337: 1335:Key stretching 1332: 1327: 1322: 1317: 1312: 1307: 1302: 1301: 1300: 1295: 1285: 1283:Cryptovirology 1280: 1275: 1270: 1268:Cryptocurrency 1265: 1260: 1255: 1254: 1253: 1243: 1238: 1232: 1230: 1226: 1225: 1220: 1218: 1217: 1210: 1203: 1195: 1185: 1184: 1177: 1176:External links 1174: 1173: 1172: 1166: 1146: 1134: 1118:(2020-01-03). 1112: 1098: 1078: 1029: 1023: 1005:King, David A. 1001: 976: 948: 930: 899: 885: 863: 845:(2): 241–268. 828: 814: 792: 759: 756: 753: 752: 720: 714: 693: 682:. 12 July 2023 667: 652: 631:10.1086/698861 605: 599:978-0974524566 598: 579: 578: 576: 573: 572: 571: 569:Telegraph code 566: 561: 556: 551: 546: 544:Autokey cipher 539: 536: 528:Claude Shannon 503: 502: 492: 479: 476: 475: 474: 471:stream ciphers 468: 454: 453: 436: 418: 415: 407:rotor machines 336: 333: 324: 321: 240:Main article: 237: 234: 218: 215: 214: 213: 202: 199:stream ciphers 184:cryptovariable 93:Edward Larsson 84: 83: 38: 36: 29: 15: 13: 10: 9: 6: 4: 3: 2: 1596: 1595: 1584: 1581: 1579: 1576: 1575: 1573: 1554: 1546: 1545: 1542: 1536: 1535:Steganography 1533: 1531: 1528: 1526: 1523: 1521: 1518: 1516: 1513: 1511: 1508: 1506: 1503: 1501: 1498: 1496: 1493: 1491: 1490:Stream cipher 1488: 1486: 1483: 1481: 1478: 1477: 1475: 1471: 1465: 1462: 1460: 1457: 1455: 1452: 1450: 1449:Onion routing 1447: 1445: 1442: 1440: 1437: 1435: 1432: 1430: 1429:Shared secret 1427: 1425: 1422: 1420: 1417: 1415: 1412: 1410: 1407: 1405: 1402: 1400: 1397: 1395: 1392: 1390: 1387: 1385: 1382: 1380: 1377: 1375: 1372: 1369: 1366: 1361: 1358: 1357: 1356: 1353: 1351: 1348: 1346: 1343: 1341: 1338: 1336: 1333: 1331: 1328: 1326: 1325:Key generator 1323: 1321: 1318: 1316: 1313: 1311: 1308: 1306: 1303: 1299: 1296: 1294: 1291: 1290: 1289: 1288:Hash function 1286: 1284: 1281: 1279: 1276: 1274: 1271: 1269: 1266: 1264: 1263:Cryptanalysis 1261: 1259: 1256: 1252: 1249: 1248: 1247: 1244: 1242: 1239: 1237: 1234: 1233: 1231: 1227: 1223: 1216: 1211: 1209: 1204: 1202: 1197: 1196: 1193: 1189: 1183: 1180: 1179: 1175: 1169: 1163: 1159: 1155: 1151: 1147: 1137: 1131: 1127: 1123: 1122: 1117: 1113: 1109: 1105: 1101: 1099:0-88385-622-0 1095: 1091: 1087: 1083: 1079: 1069: 1065: 1061: 1057: 1053: 1049: 1045: 1041: 1040: 1035: 1030: 1026: 1024:3-515-07640-9 1020: 1016: 1013:. Stuttgart: 1012: 1011: 1006: 1002: 991: 987: 986: 981: 977: 973: 967: 959: 955: 951: 949:0-684-83130-9 945: 941: 940: 935: 931: 921: 917: 913: 908: 907: 900: 896: 892: 888: 886:0-486-20097-3 882: 878: 874: 873: 872:Cryptanalysis 868: 864: 860: 856: 852: 848: 844: 840: 839: 834: 829: 825: 821: 817: 811: 807: 803: 802: 797: 793: 789: 785: 781: 777: 774:(2): 97–126. 773: 769: 768: 762: 761: 757: 737: 730: 724: 721: 717: 715:0-8493-8521-0 711: 707: 703: 697: 694: 681: 677: 671: 668: 663: 656: 653: 648: 644: 640: 636: 632: 628: 624: 620: 616: 609: 606: 601: 595: 591: 584: 581: 574: 570: 567: 565: 564:Steganography 562: 560: 557: 555: 552: 550: 547: 545: 542: 541: 537: 535: 533: 529: 525: 523: 519: 515: 510: 508: 500: 496: 493: 490: 485: 484: 483: 477: 472: 469: 466: 465:block ciphers 463: 462: 461: 458: 451: 447: 441: 437: 434: 430: 427: 426: 425: 422: 416: 414: 412: 408: 402: 400: 396: 392: 387: 385: 381: 376: 374: 370: 366: 362: 358: 353: 350: 349:Caesar Cipher 341: 334: 332: 330: 322: 320: 318: 314: 313:cryptanalysis 309: 308:" and so on. 307: 303: 299: 294: 292: 291:transposition 288: 284: 280: 276: 270: 268: 267:Stenographers 264: 259: 257: 253: 248: 243: 235: 233: 231: 226: 224: 216: 211: 207: 203: 200: 196: 195:block ciphers 192: 191: 190: 187: 185: 181: 177: 172: 170: 166: 161: 156: 152: 150: 146: 142: 138: 134: 130: 126: 122: 118: 110: 109:pigpen cipher 106: 102: 98: 94: 90: 80: 77: 69: 59: 55: 49: 48: 42: 37: 28: 27: 22: 1578:Cryptography 1485:Block cipher 1330:Key schedule 1320:Key exchange 1310:Kleptography 1273:Cryptosystem 1222:Cryptography 1153: 1139:. Retrieved 1120: 1088:. New York: 1085: 1071:. Retrieved 1043: 1037: 1009: 994:. Retrieved 985:Khan Academy 983: 938: 923:. Retrieved 905: 871: 842: 836: 832: 800: 771: 765: 743:. Retrieved 736:the original 723: 705: 696: 684:. Retrieved 679: 670: 661: 655: 622: 618: 608: 589: 583: 549:Cover-coding 532:one-time pad 526: 511: 504: 481: 459: 455: 423: 420: 403: 399:one-time pad 388: 377: 354: 346: 326: 310: 305: 301: 297: 295: 290: 287:substitution 286: 282: 278: 271: 260: 249: 245: 236:Versus codes 229: 227: 220: 188: 183: 182:parlance, a 173: 157: 153: 141:encipherment 140: 124: 120: 117:cryptography 114: 72: 63: 44: 1473:Mathematics 1464:Mix network 1182:Kish cypher 1046:(1): 2–17. 934:Kahn, David 767:Cryptologia 745:February 3, 371:(such as a 105:blackletter 97:rune cipher 58:introducing 1572:Categories 1424:Ciphertext 1394:Decryption 1389:Encryption 1350:Ransomware 1141:2024-06-30 1073:2023-02-19 996:2024-06-30 925:2024-06-30 804:. London: 758:References 662:Top Secret 625:(4): 975. 514:Key Length 335:Historical 169:ciphertext 137:decryption 133:encryption 66:March 2009 41:references 1414:Plaintext 1158:CRC Press 966:cite book 936:(1996) . 869:(1956) . 859:1522-9270 824:503638180 647:165362817 507:algorithm 363:(such as 256:telegrams 228:The term 217:Etymology 165:plaintext 129:algorithm 1553:Category 1459:Kademlia 1419:Codetext 1362:(CSPRNG) 1084:(1968). 1068:14686417 1007:(2001). 990:Archived 958:35159231 895:7634764M 798:(2010). 788:62601575 704:(1995), 686:4 August 680:The Past 639:26584834 619:Speculum 538:See also 495:Key size 395:Vigenère 317:codebook 306:decoding 302:codetext 298:encoding 160:codebook 127:) is an 1583:Ciphers 1229:General 1126:Pearson 1108:149668W 1060:2686311 833:Henry V 283:ciphers 54:improve 1340:Keygen 1164:  1132:  1106:  1096:  1066:  1058:  1021:  956:  946:  893:  883:  857:  822:  812:  786:  712:  645:  637:  596:  417:Modern 367:) and 230:cipher 125:cypher 121:cipher 43:, but 1370:(PRN) 1064:S2CID 1056:JSTOR 784:S2CID 739:(PDF) 732:(PDF) 643:S2CID 635:JSTOR 575:Notes 411:Bombe 365:ROT13 323:Types 279:codes 263:Kanji 1162:ISBN 1130:ISBN 1094:ISBN 1019:ISBN 972:link 954:OCLC 944:ISBN 912:IEEE 881:ISBN 855:ISSN 820:OCLC 810:ISBN 747:2019 710:ISBN 688:2023 594:ISBN 518:bits 347:The 289:and 281:and 223:zero 145:code 123:(or 119:, a 1048:doi 916:doi 847:doi 776:doi 627:doi 487:of 180:NSA 176:key 135:or 115:In 95:'s 1574:: 1160:. 1128:. 1104:OL 1102:. 1092:. 1062:. 1054:. 1044:18 1042:. 1036:. 1017:. 988:. 982:. 968:}} 964:{{ 952:. 891:OL 889:. 879:. 853:. 843:61 841:. 818:. 808:. 782:. 772:16 770:. 678:. 641:. 633:. 623:93 621:. 617:. 534:. 386:. 304:, 300:, 258:. 201:). 151:. 1214:e 1207:t 1200:v 1170:. 1144:. 1110:. 1076:. 1050:: 1027:. 999:. 974:) 960:. 928:. 918:: 897:. 861:. 849:: 826:. 790:. 778:: 749:. 690:. 664:. 649:. 629:: 602:. 448:( 431:( 111:. 79:) 73:( 68:) 64:( 50:. 23:.

Index

Cipher (disambiguation)
references
inline citations
improve
introducing
Learn how and when to remove this message

Edward Larsson
rune cipher
Kensington Runestone
blackletter
pigpen cipher
cryptography
algorithm
encryption
decryption
code
classical cryptography
codebook
plaintext
ciphertext
key
NSA
block ciphers
stream ciphers
symmetric key algorithms
asymmetric key algorithms
zero
Code (cryptography)
commercial telegraph code

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.