Knowledge (XXG)

ROT13

Source đź“ť

33: 2695: 409:, because thirteen is the value for which encoding and decoding are equivalent, thereby allowing the convenience of a single command for both. ROT13 is typically supported as a built-in feature to news reading software. Email addresses are also sometimes encoded with ROT13 to hide them from less sophisticated 440:
is little better than ROT13 these days". Also, in a play on real terms like "double DES", the terms "double ROT13", "ROT26", or "2ROT13" crop up with humorous intent (due to the fact that, since applying ROT13 to an already ROT13-encrypted text restores the original
416:
In encrypted, normal, English-language text of any significant size, ROT13 is recognizable from some letter/word patterns. The words "n", "V" (capitalized only), and "gur" (ROT13 for "a", "I", and "the"), and words ending in "yl" ("ly") are examples.
413:. It is also used to circumvent email screening and spam filtering. By obscuring an email's content, the screening algorithm is unable to identify the email as, for instance, a security risk, and allows it into the recipient's in-box. 445:, ROT26 is equivalent to no encryption at all), including a spoof academic paper entitled "On the 2ROT13 Encryption Algorithm". By extension, triple-ROT13 (used in joking analogy with 3DES) is equivalent to regular ROT13. 176:
are affected; numbers, symbols, punctuation, whitespace, and all other characters are left unchanged. Because there are 26 letters in the English alphabet and 26 = 2 × 13, the ROT13 function is its own
456:
demonstrated that an eBook vendor, New Paradigm Research Group (NPRG), used ROT13 to encrypt their documents; it has been speculated that NPRG may have mistaken the ROT13 toy example—provided with the
248: 857:
ROT5 is a practice similar to ROT13 that applies to numeric digits (0 to 9). ROT13 and ROT5 can be used together in the same message, sometimes called ROT18 (18 = 13 + 5) or ROT13.5.
2675: 2505: 880:', 94 in total, taken in the order of the numerical values of their ASCII codes, are rotated by 47 positions, without special consideration of case. For example, the character 1538: 1932: 1655: 904:. On the other hand, because ROT47 introduces numbers and symbols into the mix without discrimination, it is more immediately obvious that the text has been encoded. 2358: 120:
Applying ROT13 to a piece of text merely requires examining its alphabetic characters and replacing each one by the letter 13 places further along in the
1807: 1783: 775:
ROT13 provides an opportunity for letter games. Some words will, when transformed with ROT13, produce another word. Examples of 7-letter pairs in the
860:
ROT47 is a derivative of ROT13 which, in addition to scrambling the basic letters, treats numbers and common symbols. Instead of using the sequence
428:, and decryption requires no more knowledge than the fact that ROT13 is in use. Even without this knowledge, the algorithm is easily broken through 815: 1629: 1567: 1318: 1925: 1858: 949:—which has a similar purpose to ROT13, although it is intended for use with arbitrary binary data. The function operates by combining each 1426: 1324: 429: 2351: 1401: 1373: 896:. The use of a larger alphabet produces a more thorough obfuscation than that of ROT13; for example, a telephone number such as 1918: 1511: 187: 2554: 1534: 1651: 432:. Because of its utter unsuitability for real secrecy, ROT13 has become a catchphrase to refer to any conspicuously weak 2344: 2670: 2625: 2438: 108:
from the casual glance. ROT13 has inspired a variety of letter and word games online, and is frequently mentioned in
2723: 2549: 1686: 375: 2728: 2665: 1719: 401:
by the early 1980s. It is used to hide potentially offensive jokes, or to obscure an answer to a puzzle or other
1828: 464:—for a serious encryption scheme. Windows XP uses ROT13 on some of its registry keys. ROT13 is also used in the 2655: 2645: 2500: 1779: 461: 437: 264: 70: 1804: 2650: 2640: 2443: 2403: 2396: 2386: 2381: 1771: 2391: 1597: 936: 826:
correctly. Its operation, when executed, is either to perform ROT13 encoding on, or to reverse its input.
81:
is applied, so the same action can be used for encoding and decoding. The algorithm provides virtually no
2698: 2544: 2490: 2269: 1960: 449: 387: 2194: 1749: 2660: 2584: 2300: 2204: 2158: 2148: 2143: 2138: 2130: 932: 361: 1560: 2423: 2319: 2314: 2228: 2062: 1602: 1389: 1365: 55: 1621: 1287:
Early uses of ROT13 found in the Google USENET archive date back to 8 October 1982, posted to the
2529: 2513: 2460: 2295: 2214: 2120: 2052: 1160: 865: 425: 1983: 1850: 452:
used ROT13 as part of an insecure scheme to store email passwords. In 2001, Russian programmer
2589: 2579: 2450: 2264: 2184: 2153: 2047: 1978: 1397: 1369: 1314: 1084: 966: 270: 2524: 1941: 1476: 1453: 1357: 1308: 819: 776: 453: 379: 178: 173: 74: 1418: 424:
is of any concern—the use of a constant shift means that the encryption effectively has no
2085: 2042: 2011: 1993: 1811: 1499: 1472: 421: 402: 97: 86: 32: 1449: 1358: 2599: 2519: 2480: 2428: 2413: 2304: 2199: 2080: 1973: 1968: 1353: 791: 465: 59: 2717: 2680: 2635: 2594: 2574: 2470: 2433: 2408: 2256: 2110: 2090: 2070: 2021: 2001: 1891: 1263: 986:
The ROT13 and ROT47 are fairly easy to implement using the Unix terminal application
954: 928: 845:
on alt.folklore.urban, after some posters complained that "Sheesh!" as a response to
457: 406: 405:. A shift of thirteen was chosen over other values, such as three as in the original 369: 365: 63: 1503: 2630: 2475: 2465: 2455: 2418: 2367: 2189: 2100: 2006: 1617: 973:) is self-reciprocal, and provides a similar, virtually absent, level of security. 962: 278: 258:
In other words, two successive applications of ROT13 restore the original text (in
93: 82: 872:. Specifically, the 7-bit printable characters, excluding space, from decimal 33 ' 341:
Transforming the entire text via ROT13 form, the answer to the joke is revealed:
2609: 2274: 2241: 2236: 2105: 992:; to encrypt the string "The Quick Brown Fox Jumps Over The Lazy Dog" in ROT13: 958: 797: 781: 259: 1480: 1457: 2569: 2539: 2534: 2495: 2308: 2290: 2095: 2026: 1625: 1593: 842: 433: 330:
For example, in the following joke, the punchline has been obscured by ROT13:
101: 2559: 2246: 988: 442: 410: 398: 109: 105: 78: 2604: 2564: 2016: 823: 121: 1678: 1419:"Perpetual Futility: A short history of the search for perpetual motion" 834: 1897: 1851:"codecs – Codec registry and base classes – Python 3.9.6 documentation" 864:
as the alphabet, ROT47 uses a larger set of characters from the common
1709: 811:
is an example of words that are both ROT13 reciprocals and reversals.
801:. Other examples of words like these are shown in the table. The pair 31: 2485: 2209: 2075: 1949: 1887: 1883: 1836: 1745: 1268: 846: 17: 2179: 2174: 1714: 1065: 869: 833:—that was the ROT13 encoding of the frequently encoded utterance " 469: 950: 803: 148:, then the sequence continues at the beginning of the alphabet: 2340: 1914: 1159:
Without importing any libraries, it can be done in a two-line
1596:. "Bad Cryptography in the Netscape Browser: A Case Study". 1068:, one can ROT13 the buffer or a selection with the commands 58:
that replaces a letter with the 13th letter after it in the
1741: 1310:
Modern Cryptanalysis: Techniques for Advanced Code Breaking
1000:# Map upper case A-Z to N-ZA-M and lower case a-z to n-za-m 1566:. PrĂĽfziffernberechnung in der Praxis. 25 September 2004. 841:" evolved in mid-1992 as a response to postings repeating 352:
A second application of ROT13 would restore the original.
243:{\displaystyle {\mbox{ROT}}_{13}({\mbox{ROT}}_{13}(x))=x} 900:
is not obvious at first sight from the scrambled result
382:
machines, pointed out that ROT13 encodes his surname as
1035:"The Quick Brown Fox Jumps Over The Lazy Dog" 1016:"The Quick Brown Fox Jumps Over The Lazy Dog" 85:
security, and is often cited as a canonical example of
2506:
Cryptographically secure pseudorandom number generator
1174:"Quartz glyph job vext cwm porshrop finks?!" 818:(IOCCC) included an entry by Brian Westley. Westley's 479: 210: 193: 1142:'The Quick Brown Fox Jumps Over The Lazy Dog' 190: 1902: 2618: 2374: 2283: 2255: 2227: 2167: 2129: 2061: 2035: 1992: 1959: 1948: 1364:(Second ed.). John Wiley & Sons. pp.  1054:"F:4< qC@H? u@I yF>AD ~G6C %96 {2KJ s@8 931:, a set of standard routines available for use in 922:%96 "F:4< qC@H? u@I yF>AD ~G6C %96 {2KJ s@8] 242: 378:, an 18th-century clockmaker and constructor of 1829:"Best of VIM Tips, gVIM's Key Features zzapper" 829:The newsgroup alt.folklore.urban coined a word— 124:, wrapping back to the beginning if necessary. 822:can be encoded in ROT13 or reversed and still 2352: 1926: 1394:The Codebreakers: The Story of Secret Writing 8: 1535:"How to Hide Email Addresses From Spam Bots" 1252:# Dhnegm tylcu wbo irkg pjz cbefuebc svaxf?! 912:The Quick Brown Fox Jumps Over The Lazy Dog. 1154:Gur Dhvpx Oebja Sbk Whzcf Bire Gur Ynml Qbt 1019:Gur Dhvpx Oebja Sbk Whzcf Bire Gur Ynml Qbt 69:Because there are 26 letters (2Ă—13) in the 2359: 2345: 2337: 1956: 1933: 1919: 1911: 1907: 1903: 1348: 1346: 1344: 1342: 1087:, one can ROT13 a buffer with the command 436:scheme; a critic might claim that "56-bit 1601: 216: 209: 199: 192: 189: 1494: 1492: 1490: 283: 172:. Only those letters which occur in the 1299: 1280: 816:International Obfuscated C Code Contest 420:ROT13 is not intended to be used where 277:The transformation can be done using a 1658:from the original on 20 December 2016 1450:"very mildly obscence joke, shift=13" 1307:Christopher Swenson (17 March 2008). 66:which was developed in ancient Rome. 7: 1632:from the original on 17 October 2014 1622:"Dimitry Sklyarov: Enemy or friend?" 1561:"On the 2ROT13 Encryption Algorithm" 1514:from the original on 13 January 2012 1429:from the original on 10 October 2020 1313:. John Wiley & Sons. p. 5. 448:In December 1999, it was found that 1861:from the original on 6 October 2020 345:Jul qvq gur puvpxra pebff gur ebnq? 334:Why did the chicken cross the road? 77:; that is, to undo ROT13, the same 1786:from the original on 2 August 2019 1776:The GNU C Library Reference Manual 1573:from the original on 15 April 2012 943: 397:ROT13 was in use in the net.jokes 250:for any basic Latin-alphabet text 25: 1752:from the original on 14 July 2014 1689:from the original on 2 April 2012 1327:from the original on 24 June 2016 969:. Like ROT13, XOR (and therefore 468:to conceal potentially offensive 62:. ROT13 is a special case of the 2694: 2693: 1805:"Rmail Rot13 – GNU Emacs Manual" 1722:from the original on 9 June 2012 1533:Ferner, Matt (9 December 2010). 1423:The Museum of Unworkable Devices 965:(XOR) operation. This effects a 1898:ROT13 to Text on PureTables.com 1886:for ROT13, ROT5, ROT18, ROT47, 1541:from the original on 8 May 2016 1471:utcsrgv!dave (8 October 1982). 1024:and the same string for ROT47: 360:ROT13 is a special case of the 2555:Information-theoretic security 1835:. 3 March 2016. Archived from 262:, this is sometimes called an 231: 228: 222: 205: 1: 1448:desoto!gog (8 October 1982). 476:Letter games and net culture 2671:Message authentication code 2626:Cryptographic hash function 2439:Cryptographic hash function 1417:Simanek, Donald E. (2012). 2745: 2550:Harvest now, decrypt later 1652:"ROT13 is used in Windows" 1502:, ed. (29 December 2003). 488:NOPQRSTUVWXYZABCDEFGHIJKLM 484:abcdefghijklmnopqrstuvwxyz 376:Johann Ernst Elias Bessler 2689: 2666:Post-quantum cryptography 2336: 1910: 1906: 482: 348:To get to the other side! 337:Gb trg gb gur bgure fvqr! 281:, such as the following: 2656:Quantum key distribution 2646:Authenticated encryption 2501:Random number generation 1780:Free Software Foundation 1165: 1109: 1026: 994: 462:software development kit 104:, puzzle solutions, and 50:", sometimes hyphenated 27:Simple encryption method 2651:Public-key cryptography 2641:Symmetric-key algorithm 2444:Key derivation function 2404:Cryptographic primitive 2397:Authentication protocol 2387:Outline of cryptography 2382:History of cryptography 1772:"5.13 Obfuscating Data" 1708:Westley, Brian (1989). 1396:. New York: Macmillan. 372:in the 1st century BC. 92:ROT13 has been used in 2392:Cryptographic protocol 1942:Classical cryptography 1537:. PracticalEcommerce. 1508:The Jargon File, 4.4.7 1074:M-x rot13-other-window 1010:'N-ZA-Mn-za-m' 244: 36: 2545:End-to-end encryption 2491:Cryptojacking malware 1810:24 March 2016 at the 1070:M-x toggle-rot13-mode 450:Netscape Communicator 268:; in cryptography, a 245: 96:as a means of hiding 54:) is a simple letter 35: 2661:Quantum cryptography 2585:Trusted timestamping 2301:Index of coincidence 2205:Reservehandverfahren 1620:(1 September 2001). 1360:Applied Cryptography 933:computer programming 849:was being overused. 466:Unix fortune program 394:, as his pseudonym. 362:encryption algorithm 188: 71:basic Latin alphabet 2424:Cryptographic nonce 2320:Kasiski examination 2315:Information leakage 1857:. 2 November 2023. 1782:. 3 December 2006. 1748:. 25 October 1995. 106:offensive materials 73:, ROT13 is its own 56:substitution cipher 48:rotate by 13 places 2530:Subliminal channel 2514:Pseudorandom noise 2461:Key (cryptography) 2296:Frequency analysis 2195:RasterschlĂĽssel 44 1161:list comprehension 957:pattern 00101010 ( 866:character encoding 430:frequency analysis 240: 214: 197: 140:, and so on up to 37: 2724:Classical ciphers 2711: 2710: 2707: 2706: 2590:Key-based routing 2580:Trapdoor function 2451:Digital signature 2332: 2331: 2328: 2327: 2223: 2222: 1473:"encrypted jokes" 1320:978-0-470-13593-8 1045:'P-~\!-O' 967:simple XOR cipher 773: 772: 328: 327: 271:reciprocal cipher 213: 196: 16:(Redirected from 2736: 2729:Internet culture 2697: 2696: 2525:Insecure channel 2361: 2354: 2347: 2338: 1957: 1935: 1928: 1921: 1912: 1908: 1904: 1884:Online converter 1871: 1870: 1868: 1866: 1847: 1841: 1840: 1839:on 3 March 2016. 1825: 1819: 1802: 1796: 1795: 1793: 1791: 1768: 1762: 1761: 1759: 1757: 1738: 1732: 1731: 1729: 1727: 1705: 1699: 1698: 1696: 1694: 1677:De Mulder, Tom. 1674: 1668: 1667: 1665: 1663: 1654:. 24 July 2006. 1648: 1642: 1641: 1639: 1637: 1614: 1608: 1607: 1605: 1592:Hollebeek, Tim; 1589: 1583: 1582: 1580: 1578: 1572: 1565: 1557: 1551: 1550: 1548: 1546: 1530: 1524: 1523: 1521: 1519: 1500:Raymond, Eric S. 1496: 1485: 1484: 1468: 1462: 1461: 1445: 1439: 1438: 1436: 1434: 1414: 1408: 1407: 1386: 1380: 1379: 1363: 1350: 1337: 1336: 1334: 1332: 1304: 1292: 1285: 1253: 1250: 1247: 1244: 1241: 1238: 1235: 1232: 1229: 1226: 1223: 1220: 1217: 1214: 1211: 1208: 1205: 1202: 1199: 1196: 1193: 1190: 1187: 1184: 1181: 1178: 1175: 1172: 1169: 1155: 1152: 1149: 1146: 1143: 1140: 1137: 1134: 1131: 1128: 1125: 1122: 1119: 1116: 1113: 1107:text transform. 1106: 1102: 1090: 1079: 1078:M-x rot13-region 1075: 1071: 1055: 1052: 1049: 1046: 1043: 1039: 1036: 1033: 1030: 1020: 1017: 1014: 1011: 1008: 1007:'A-Za-z' 1004: 1001: 998: 945: 820:computer program 777:English language 480: 454:Dimitry Sklyarov 380:perpetual motion 323: 320: 317: 314: 302: 299: 296: 293: 284: 249: 247: 246: 241: 221: 220: 215: 211: 204: 203: 198: 194: 174:English alphabet 168:, which becomes 144:, which becomes 21: 2744: 2743: 2739: 2738: 2737: 2735: 2734: 2733: 2714: 2713: 2712: 2703: 2685: 2614: 2370: 2365: 2324: 2279: 2251: 2219: 2163: 2125: 2057: 2031: 1994:Polybius square 1988: 1952: 1944: 1939: 1880: 1875: 1874: 1864: 1862: 1849: 1848: 1844: 1827: 1826: 1822: 1812:Wayback Machine 1803: 1799: 1789: 1787: 1770: 1769: 1765: 1755: 1753: 1740: 1739: 1735: 1725: 1723: 1707: 1706: 1702: 1692: 1690: 1676: 1675: 1671: 1661: 1659: 1650: 1649: 1645: 1635: 1633: 1616: 1615: 1611: 1591: 1590: 1586: 1576: 1574: 1570: 1563: 1559: 1558: 1554: 1544: 1542: 1532: 1531: 1527: 1517: 1515: 1498: 1497: 1488: 1470: 1469: 1465: 1447: 1446: 1442: 1432: 1430: 1416: 1415: 1411: 1404: 1388: 1387: 1383: 1376: 1354:Schneier, Bruce 1352: 1351: 1340: 1330: 1328: 1321: 1306: 1305: 1301: 1296: 1295: 1290: 1286: 1282: 1277: 1260: 1255: 1254: 1251: 1248: 1245: 1242: 1239: 1236: 1233: 1230: 1227: 1224: 1221: 1218: 1215: 1212: 1209: 1206: 1203: 1200: 1197: 1194: 1191: 1188: 1185: 1182: 1179: 1176: 1173: 1170: 1167: 1157: 1156: 1153: 1150: 1148:'rot13' 1147: 1144: 1141: 1138: 1135: 1132: 1129: 1126: 1123: 1120: 1117: 1114: 1111: 1104: 1100: 1097: 1088: 1085:Vim text editor 1077: 1073: 1069: 1062: 1057: 1056: 1053: 1050: 1047: 1044: 1041: 1037: 1034: 1031: 1028: 1022: 1021: 1018: 1015: 1012: 1009: 1006: 1002: 999: 996: 991: 984: 979: 972: 947: 923: 913: 903: 902:Z'\c`d\gbh\eggd 899: 898:+1-415-839-6885 895: 891: 887: 883: 879: 876:' through 126 ' 875: 863: 855: 840: 769: 765: 760: 756: 749: 745: 740: 736: 729: 725: 720: 716: 709: 705: 700: 696: 689: 685: 680: 676: 669: 665: 660: 656: 649: 645: 640: 636: 629: 625: 620: 616: 609: 605: 600: 596: 589: 585: 580: 576: 569: 565: 560: 556: 549: 545: 540: 536: 529: 525: 520: 516: 509: 505: 500: 496: 489: 486: 485: 478: 358: 324: 321: 318: 315: 312: 303: 300: 297: 294: 291: 208: 191: 186: 185: 171: 167: 164:, and so on to 163: 159: 155: 151: 147: 143: 139: 135: 131: 127: 118: 112:conversations. 87:weak encryption 28: 23: 22: 15: 12: 11: 5: 2742: 2740: 2732: 2731: 2726: 2716: 2715: 2709: 2708: 2705: 2704: 2702: 2701: 2690: 2687: 2686: 2684: 2683: 2678: 2676:Random numbers 2673: 2668: 2663: 2658: 2653: 2648: 2643: 2638: 2633: 2628: 2622: 2620: 2616: 2615: 2613: 2612: 2607: 2602: 2600:Garlic routing 2597: 2592: 2587: 2582: 2577: 2572: 2567: 2562: 2557: 2552: 2547: 2542: 2537: 2532: 2527: 2522: 2520:Secure channel 2517: 2511: 2510: 2509: 2498: 2493: 2488: 2483: 2481:Key stretching 2478: 2473: 2468: 2463: 2458: 2453: 2448: 2447: 2446: 2441: 2431: 2429:Cryptovirology 2426: 2421: 2416: 2414:Cryptocurrency 2411: 2406: 2401: 2400: 2399: 2389: 2384: 2378: 2376: 2372: 2371: 2366: 2364: 2363: 2356: 2349: 2341: 2334: 2333: 2330: 2329: 2326: 2325: 2323: 2322: 2317: 2312: 2298: 2293: 2287: 2285: 2281: 2280: 2278: 2277: 2272: 2267: 2261: 2259: 2253: 2252: 2250: 2249: 2244: 2239: 2233: 2231: 2225: 2224: 2221: 2220: 2218: 2217: 2212: 2207: 2202: 2200:Reihenschieber 2197: 2192: 2187: 2182: 2177: 2171: 2169: 2165: 2164: 2162: 2161: 2156: 2151: 2146: 2141: 2135: 2133: 2127: 2126: 2124: 2123: 2118: 2113: 2108: 2103: 2098: 2093: 2088: 2083: 2078: 2073: 2067: 2065: 2059: 2058: 2056: 2055: 2050: 2045: 2039: 2037: 2033: 2032: 2030: 2029: 2024: 2019: 2014: 2009: 2004: 1998: 1996: 1990: 1989: 1987: 1986: 1981: 1976: 1971: 1965: 1963: 1961:Polyalphabetic 1954: 1946: 1945: 1940: 1938: 1937: 1930: 1923: 1915: 1901: 1900: 1895: 1879: 1878:External links 1876: 1873: 1872: 1855:ww6.python.org 1842: 1833:rayninfo.co.uk 1820: 1797: 1763: 1733: 1700: 1669: 1643: 1609: 1603:10.1.1.15.9271 1584: 1552: 1525: 1486: 1463: 1440: 1409: 1402: 1381: 1374: 1338: 1319: 1298: 1297: 1294: 1293: 1288: 1279: 1278: 1276: 1273: 1272: 1271: 1266: 1259: 1256: 1166: 1110: 1096: 1093: 1061: 1058: 1042:'\!-~' 1027: 995: 987: 983: 980: 978: 977:Implementation 975: 970: 941: 925: 924: 921: 915: 914: 911: 901: 897: 893: 889: 885: 881: 877: 873: 861: 854: 851: 838: 771: 770: 767: 763: 761: 758: 754: 751: 750: 747: 743: 741: 738: 734: 731: 730: 727: 723: 721: 718: 714: 711: 710: 707: 703: 701: 698: 694: 691: 690: 687: 683: 681: 678: 674: 671: 670: 667: 663: 661: 658: 654: 651: 650: 647: 643: 641: 638: 634: 631: 630: 627: 623: 621: 618: 614: 611: 610: 607: 603: 601: 598: 594: 591: 590: 587: 583: 581: 578: 574: 571: 570: 567: 563: 561: 558: 554: 551: 550: 547: 543: 541: 538: 534: 531: 530: 527: 523: 521: 518: 514: 511: 510: 507: 503: 501: 498: 494: 491: 490: 487: 483: 477: 474: 386:. He used its 357: 354: 350: 349: 346: 339: 338: 335: 326: 325: 311: 309: 305: 304: 290: 288: 256: 255: 239: 236: 233: 230: 227: 224: 219: 207: 202: 169: 165: 161: 157: 153: 149: 145: 141: 137: 133: 129: 125: 117: 114: 60:Latin alphabet 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2741: 2730: 2727: 2725: 2722: 2721: 2719: 2700: 2692: 2691: 2688: 2682: 2681:Steganography 2679: 2677: 2674: 2672: 2669: 2667: 2664: 2662: 2659: 2657: 2654: 2652: 2649: 2647: 2644: 2642: 2639: 2637: 2636:Stream cipher 2634: 2632: 2629: 2627: 2624: 2623: 2621: 2617: 2611: 2608: 2606: 2603: 2601: 2598: 2596: 2595:Onion routing 2593: 2591: 2588: 2586: 2583: 2581: 2578: 2576: 2575:Shared secret 2573: 2571: 2568: 2566: 2563: 2561: 2558: 2556: 2553: 2551: 2548: 2546: 2543: 2541: 2538: 2536: 2533: 2531: 2528: 2526: 2523: 2521: 2518: 2515: 2512: 2507: 2504: 2503: 2502: 2499: 2497: 2494: 2492: 2489: 2487: 2484: 2482: 2479: 2477: 2474: 2472: 2471:Key generator 2469: 2467: 2464: 2462: 2459: 2457: 2454: 2452: 2449: 2445: 2442: 2440: 2437: 2436: 2435: 2434:Hash function 2432: 2430: 2427: 2425: 2422: 2420: 2417: 2415: 2412: 2410: 2409:Cryptanalysis 2407: 2405: 2402: 2398: 2395: 2394: 2393: 2390: 2388: 2385: 2383: 2380: 2379: 2377: 2373: 2369: 2362: 2357: 2355: 2350: 2348: 2343: 2342: 2339: 2335: 2321: 2318: 2316: 2313: 2310: 2306: 2302: 2299: 2297: 2294: 2292: 2289: 2288: 2286: 2284:Cryptanalysis 2282: 2276: 2273: 2271: 2268: 2266: 2263: 2262: 2260: 2258: 2257:Steganography 2254: 2248: 2245: 2243: 2240: 2238: 2235: 2234: 2232: 2230: 2226: 2216: 2213: 2211: 2208: 2206: 2203: 2201: 2198: 2196: 2193: 2191: 2188: 2186: 2183: 2181: 2178: 2176: 2173: 2172: 2170: 2166: 2160: 2157: 2155: 2152: 2150: 2147: 2145: 2142: 2140: 2137: 2136: 2134: 2132: 2131:Transposition 2128: 2122: 2119: 2117: 2114: 2112: 2109: 2107: 2104: 2102: 2099: 2097: 2094: 2092: 2089: 2087: 2084: 2082: 2079: 2077: 2074: 2072: 2069: 2068: 2066: 2064: 2060: 2054: 2051: 2049: 2046: 2044: 2041: 2040: 2038: 2034: 2028: 2025: 2023: 2020: 2018: 2015: 2013: 2010: 2008: 2005: 2003: 2000: 1999: 1997: 1995: 1991: 1985: 1982: 1980: 1977: 1975: 1972: 1970: 1967: 1966: 1964: 1962: 1958: 1955: 1951: 1947: 1943: 1936: 1931: 1929: 1924: 1922: 1917: 1916: 1913: 1909: 1905: 1899: 1896: 1893: 1892:Caesar cipher 1889: 1885: 1882: 1881: 1877: 1860: 1856: 1852: 1846: 1843: 1838: 1834: 1830: 1824: 1821: 1817: 1813: 1809: 1806: 1801: 1798: 1785: 1781: 1777: 1773: 1767: 1764: 1751: 1747: 1743: 1737: 1734: 1721: 1717: 1716: 1711: 1704: 1701: 1688: 1684: 1680: 1679:"ROT13 Words" 1673: 1670: 1657: 1653: 1647: 1644: 1631: 1627: 1623: 1619: 1618:Perens, Bruce 1613: 1610: 1604: 1599: 1595: 1588: 1585: 1569: 1562: 1556: 1553: 1540: 1536: 1529: 1526: 1513: 1509: 1505: 1501: 1495: 1493: 1491: 1487: 1482: 1478: 1474: 1467: 1464: 1459: 1455: 1451: 1444: 1441: 1428: 1424: 1420: 1413: 1410: 1405: 1403:0-684-83130-9 1399: 1395: 1391: 1385: 1382: 1377: 1375:0-471-11709-9 1371: 1367: 1362: 1361: 1355: 1349: 1347: 1345: 1343: 1339: 1326: 1322: 1316: 1312: 1311: 1303: 1300: 1284: 1281: 1274: 1270: 1267: 1265: 1264:Cryptanalysis 1262: 1261: 1257: 1164: 1162: 1121:>>> 1112:>>> 1108: 1094: 1092: 1086: 1081: 1067: 1060:Emacs and Vim 1059: 1025: 993: 990: 981: 976: 974: 968: 964: 960: 956: 952: 948: 938: 935:, contains a 934: 930: 929:GNU C library 920: 919: 918: 917:enciphers to 910: 909: 908: 905: 892:is mapped to 884:is mapped to 871: 867: 858: 852: 850: 848: 844: 836: 832: 827: 825: 821: 817: 812: 810: 806: 805: 800: 799: 794: 793: 788: 784: 783: 778: 762: 753: 752: 742: 733: 732: 722: 713: 712: 702: 693: 692: 682: 673: 672: 662: 653: 652: 642: 633: 632: 622: 613: 612: 602: 593: 592: 582: 573: 572: 562: 553: 552: 542: 533: 532: 522: 513: 512: 502: 493: 492: 481: 475: 473: 471: 467: 463: 459: 455: 451: 446: 444: 439: 435: 431: 427: 423: 418: 414: 412: 408: 407:Caesar cipher 404: 400: 395: 393: 389: 385: 381: 377: 373: 371: 370:Julius Caesar 367: 366:Caesar cipher 363: 355: 353: 347: 344: 343: 342: 336: 333: 332: 331: 322:abcdefghijklm 319:nopqrstuvwxyz 316:ABCDEFGHIJKLM 313:NOPQRSTUVWXYZ 310: 307: 306: 301:nopqrstuvwxyz 298:abcdefghijklm 295:NOPQRSTUVWXYZ 292:ABCDEFGHIJKLM 289: 286: 285: 282: 280: 275: 273: 272: 267: 266: 261: 253: 237: 234: 225: 217: 200: 184: 183: 182: 180: 175: 123: 115: 113: 111: 107: 103: 99: 95: 94:online forums 90: 88: 84: 83:cryptographic 80: 76: 72: 67: 65: 64:Caesar cipher 61: 57: 53: 49: 45: 41: 34: 30: 19: 2631:Block cipher 2476:Key schedule 2466:Key exchange 2456:Kleptography 2419:Cryptosystem 2368:Cryptography 2190:One-time pad 2115: 2063:Substitution 1863:. Retrieved 1854: 1845: 1837:the original 1832: 1823: 1815: 1800: 1788:. Retrieved 1775: 1766: 1754:. Retrieved 1736: 1724:. Retrieved 1713: 1703: 1693:19 September 1691:. Retrieved 1682: 1672: 1660:. Retrieved 1646: 1634:. Retrieved 1612: 1587: 1577:20 September 1575:. Retrieved 1555: 1543:. Retrieved 1528: 1518:19 September 1516:. Retrieved 1507: 1466: 1443: 1431:. Retrieved 1422: 1412: 1393: 1384: 1359: 1329:. Retrieved 1309: 1302: 1283: 1158: 1098: 1082: 1063: 1023: 1013:<<< 985: 963:exclusive or 961:) using the 940: 926: 916: 906: 859: 856: 830: 828: 813: 808: 802: 796: 790: 786: 780: 774: 447: 419: 415: 396: 391: 383: 374: 359: 351: 340: 329: 279:lookup table 276: 269: 263: 257: 251: 119: 91: 68: 51: 47: 43: 39: 38: 29: 2619:Mathematics 2610:Mix network 2242:Code talker 2121:Running key 2053:Four-square 1816:www.gnu.org 1710:"westley.c" 1662:15 December 1594:Viega, John 1390:Kahn, David 1099:The module 843:urban myths 364:known as a 260:mathematics 116:Description 2718:Categories 2570:Ciphertext 2540:Decryption 2535:Encryption 2496:Ransomware 2291:Cryptogram 2185:Kama Sutra 2154:Rail fence 2149:Myszkowski 2096:Chaocipher 2048:Two-square 2027:VIC cipher 1979:Trithemius 1636:3 February 1626:ZDNet News 1433:28 October 1291:newsgroup. 1275:References 1195:'' 434:encryption 368:, used by 265:involution 102:punchlines 2560:Plaintext 2215:Solitaire 1953:by family 1865:7 October 1756:3 October 1726:13 August 1598:CiteSeerX 1481:net.jokes 1477:Newsgroup 1458:net.jokes 1454:Newsgroup 1331:5 October 1289:net.jokes 1103:provides 971:memfrob() 953:with the 907:Example: 868:known as 847:newcomers 814:The 1989 443:plaintext 411:spam bots 399:newsgroup 392:Orffyreus 388:latinised 110:newsgroup 79:algorithm 2699:Category 2605:Kademlia 2565:Codetext 2508:(CSPRNG) 2303:(Units: 2139:Columnar 2086:Beaufort 2043:Playfair 2017:Tap code 2012:Nihilist 1984:Vigenère 1859:Archived 1808:Archived 1790:2 August 1784:Archived 1750:Archived 1742:"Furrfu" 1720:Archived 1687:Archived 1656:Archived 1630:Archived 1568:Archived 1539:Archived 1512:Archived 1427:Archived 1356:(1996). 1325:Archived 1258:See also 937:function 888:, while 853:Variants 824:compiles 160:becomes 152:becomes 136:becomes 128:becomes 122:alphabet 98:spoilers 44:Rotate13 2375:General 2081:Autokey 1969:Alberti 1950:Ciphers 1683:Furrfu! 1545:12 June 1504:"ROT13" 1479::  1456::  1105:'rot13' 1083:In the 798:purpura 792:Chechen 787:nowhere 782:abjurer 768:nowhere 764:abjurer 739:Chechen 735:purpura 422:secrecy 403:spoiler 384:Orffyre 308:Output 179:inverse 75:inverse 2486:Keygen 2270:Grille 2210:Slidex 2144:Double 2111:Pigpen 2091:Caesar 2076:Atbash 2071:Affine 2036:Square 2022:Trifid 2002:ADFGVX 1974:Enigma 1888:Atbash 1746:Foldoc 1600:  1400:  1372:  1317:  1269:Atbash 1246:string 1234:string 1189:string 1168:string 1136:encode 1130:codecs 1118:codecs 1115:import 1101:codecs 1095:Python 955:binary 839:Furrfu 835:sheesh 831:furrfu 789:, and 668:cheryl 664:purely 460:eBook 390:form, 287:Input 52:ROT-13 2516:(PRN) 2265:Bacon 2229:Codes 2180:DRYAD 2175:BATCO 2168:Other 2159:Route 2116:ROT13 2101:Great 2007:Bifid 1715:IOCCC 1571:(PDF) 1564:(PDF) 1240:print 1124:print 1089:ggg?G 1076:, or 1066:Emacs 870:ASCII 748:FUBAR 744:shone 708:green 704:terra 699:sheol 695:furby 659:pyrex 655:clerk 470:dicta 458:Adobe 356:Usage 40:ROT13 18:Ebg13 2307:and 2275:Null 2247:Poem 2237:Book 2106:Hill 1890:and 1867:2020 1792:2019 1758:2016 1728:2007 1695:2007 1664:2016 1638:2011 1579:2007 1547:2014 1520:2007 1435:2020 1398:ISBN 1370:ISBN 1333:2015 1315:ISBN 1228:char 1222:char 1219:else 1216:abcd 1210:char 1201:join 1180:abcd 1032:echo 951:byte 944:frob 927:The 837:". " 809:tang 807:and 804:gnat 795:and 785:and 779:are 759:Nerf 755:Ares 719:Jung 715:what 639:tang 635:gnat 608:sync 604:flap 599:reef 595:errs 579:rail 575:envy 568:roof 564:ebbs 539:ones 535:barf 519:onyx 515:balk 2309:Nat 2305:Ban 1225:for 1177:for 1064:In 1029:$ 1003:$ 997:$ 942:mem 862:A–Z 728:hey 724:URL 688:fun 684:SHA 679:cat 675:PNG 648:vex 644:irk 628:try 624:gel 619:she 615:fur 559:ova 555:bin 528:one 524:bar 508:nag 504:ant 499:nun 495:aha 438:DES 426:key 274:). 212:ROT 195:ROT 46:, " 2720:: 1853:. 1831:. 1814:. 1778:. 1774:. 1744:. 1718:. 1712:. 1685:. 1681:. 1628:. 1624:. 1510:. 1506:. 1489:^ 1475:. 1452:. 1425:. 1421:. 1392:. 1368:. 1366:11 1341:^ 1323:. 1237:]) 1231:in 1213:in 1207:if 1183:in 1163:: 1151:)) 1091:. 1080:. 1072:, 1051:96 1040:tr 1005:tr 989:tr 982:tr 959:42 946:() 766:↔ 757:↔ 746:↔ 737:↔ 726:↔ 717:↔ 706:↔ 697:↔ 686:↔ 677:↔ 666:↔ 657:↔ 646:↔ 637:↔ 626:↔ 617:↔ 606:↔ 597:↔ 588:re 586:↔ 584:er 577:↔ 566:↔ 557:↔ 548:or 546:↔ 544:be 537:↔ 526:↔ 517:↔ 506:↔ 497:↔ 472:. 218:13 201:13 181:: 156:, 132:, 100:, 89:. 2360:e 2353:t 2346:v 2311:) 1934:e 1927:t 1920:v 1894:. 1869:. 1818:. 1794:. 1760:. 1730:. 1697:. 1666:. 1640:. 1606:. 1581:. 1549:. 1522:. 1483:. 1460:. 1437:. 1406:. 1378:. 1335:. 1249:) 1243:( 1204:( 1198:. 1192:= 1186:: 1171:= 1145:, 1139:( 1133:. 1127:( 1048:% 1038:| 939:— 894:2 890:a 886:p 882:A 878:~ 874:! 254:. 252:x 238:x 235:= 232:) 229:) 226:x 223:( 206:( 170:M 166:Z 162:B 158:O 154:A 150:N 146:Z 142:M 138:O 134:B 130:N 126:A 42:( 20:)

Index

Ebg13

substitution cipher
Latin alphabet
Caesar cipher
basic Latin alphabet
inverse
algorithm
cryptographic
weak encryption
online forums
spoilers
punchlines
offensive materials
newsgroup
alphabet
English alphabet
inverse
mathematics
involution
reciprocal cipher
lookup table
encryption algorithm
Caesar cipher
Julius Caesar
Johann Ernst Elias Bessler
perpetual motion
latinised
newsgroup
spoiler

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑