33:
2695:
409:, because thirteen is the value for which encoding and decoding are equivalent, thereby allowing the convenience of a single command for both. ROT13 is typically supported as a built-in feature to news reading software. Email addresses are also sometimes encoded with ROT13 to hide them from less sophisticated
440:
is little better than ROT13 these days". Also, in a play on real terms like "double DES", the terms "double ROT13", "ROT26", or "2ROT13" crop up with humorous intent (due to the fact that, since applying ROT13 to an already ROT13-encrypted text restores the original
416:
In encrypted, normal, English-language text of any significant size, ROT13 is recognizable from some letter/word patterns. The words "n", "V" (capitalized only), and "gur" (ROT13 for "a", "I", and "the"), and words ending in "yl" ("ly") are examples.
413:. It is also used to circumvent email screening and spam filtering. By obscuring an email's content, the screening algorithm is unable to identify the email as, for instance, a security risk, and allows it into the recipient's in-box.
445:, ROT26 is equivalent to no encryption at all), including a spoof academic paper entitled "On the 2ROT13 Encryption Algorithm". By extension, triple-ROT13 (used in joking analogy with 3DES) is equivalent to regular ROT13.
176:
are affected; numbers, symbols, punctuation, whitespace, and all other characters are left unchanged. Because there are 26 letters in the
English alphabet and 26 = 2 × 13, the ROT13 function is its own
456:
demonstrated that an eBook vendor, New
Paradigm Research Group (NPRG), used ROT13 to encrypt their documents; it has been speculated that NPRG may have mistaken the ROT13 toy example—provided with the
248:
857:
ROT5 is a practice similar to ROT13 that applies to numeric digits (0 to 9). ROT13 and ROT5 can be used together in the same message, sometimes called ROT18 (18 = 13 + 5) or ROT13.5.
2675:
2505:
880:', 94 in total, taken in the order of the numerical values of their ASCII codes, are rotated by 47 positions, without special consideration of case. For example, the character
1538:
1932:
1655:
904:. On the other hand, because ROT47 introduces numbers and symbols into the mix without discrimination, it is more immediately obvious that the text has been encoded.
2358:
120:
Applying ROT13 to a piece of text merely requires examining its alphabetic characters and replacing each one by the letter 13 places further along in the
1807:
1783:
775:
ROT13 provides an opportunity for letter games. Some words will, when transformed with ROT13, produce another word. Examples of 7-letter pairs in the
860:
ROT47 is a derivative of ROT13 which, in addition to scrambling the basic letters, treats numbers and common symbols. Instead of using the sequence
428:, and decryption requires no more knowledge than the fact that ROT13 is in use. Even without this knowledge, the algorithm is easily broken through
815:
1629:
1567:
1318:
1925:
1858:
949:—which has a similar purpose to ROT13, although it is intended for use with arbitrary binary data. The function operates by combining each
1426:
1324:
429:
2351:
1401:
1373:
896:. The use of a larger alphabet produces a more thorough obfuscation than that of ROT13; for example, a telephone number such as
1918:
1511:
187:
2554:
1534:
1651:
432:. Because of its utter unsuitability for real secrecy, ROT13 has become a catchphrase to refer to any conspicuously weak
2344:
2670:
2625:
2438:
108:
from the casual glance. ROT13 has inspired a variety of letter and word games online, and is frequently mentioned in
2723:
2549:
1686:
375:
2728:
2665:
1719:
401:
by the early 1980s. It is used to hide potentially offensive jokes, or to obscure an answer to a puzzle or other
1828:
464:—for a serious encryption scheme. Windows XP uses ROT13 on some of its registry keys. ROT13 is also used in the
2655:
2645:
2500:
1779:
461:
437:
264:
70:
1804:
2650:
2640:
2443:
2403:
2396:
2386:
2381:
1771:
2391:
1597:
936:
826:
correctly. Its operation, when executed, is either to perform ROT13 encoding on, or to reverse its input.
81:
is applied, so the same action can be used for encoding and decoding. The algorithm provides virtually no
2698:
2544:
2490:
2269:
1960:
449:
387:
2194:
1749:
2660:
2584:
2300:
2204:
2158:
2148:
2143:
2138:
2130:
932:
361:
1560:
2423:
2319:
2314:
2228:
2062:
1602:
1389:
1365:
55:
1621:
1287:
Early uses of ROT13 found in the Google USENET archive date back to 8 October 1982, posted to the
2529:
2513:
2460:
2295:
2214:
2120:
2052:
1160:
865:
425:
1983:
1850:
452:
used ROT13 as part of an insecure scheme to store email passwords. In 2001, Russian programmer
2589:
2579:
2450:
2264:
2184:
2153:
2047:
1978:
1397:
1369:
1314:
1084:
966:
270:
2524:
1941:
1476:
1453:
1357:
1308:
819:
776:
453:
379:
178:
173:
74:
1418:
424:
is of any concern—the use of a constant shift means that the encryption effectively has no
2085:
2042:
2011:
1993:
1811:
1499:
1472:
421:
402:
97:
86:
32:
1449:
1358:
2599:
2519:
2480:
2428:
2413:
2304:
2199:
2080:
1973:
1968:
1353:
791:
465:
59:
2717:
2680:
2635:
2594:
2574:
2470:
2433:
2408:
2256:
2110:
2090:
2070:
2021:
2001:
1891:
1263:
986:
The ROT13 and ROT47 are fairly easy to implement using the Unix terminal application
954:
928:
845:
on alt.folklore.urban, after some posters complained that "Sheesh!" as a response to
457:
406:
405:. A shift of thirteen was chosen over other values, such as three as in the original
369:
365:
63:
1503:
2630:
2475:
2465:
2455:
2418:
2367:
2189:
2100:
2006:
1617:
973:) is self-reciprocal, and provides a similar, virtually absent, level of security.
962:
278:
258:
In other words, two successive applications of ROT13 restore the original text (in
93:
82:
872:. Specifically, the 7-bit printable characters, excluding space, from decimal 33 '
341:
Transforming the entire text via ROT13 form, the answer to the joke is revealed:
2609:
2274:
2241:
2236:
2105:
992:; to encrypt the string "The Quick Brown Fox Jumps Over The Lazy Dog" in ROT13:
958:
797:
781:
259:
1480:
1457:
2569:
2539:
2534:
2495:
2308:
2290:
2095:
2026:
1625:
1593:
842:
433:
330:
For example, in the following joke, the punchline has been obscured by ROT13:
101:
2559:
2246:
988:
442:
410:
398:
109:
105:
78:
2604:
2564:
2016:
823:
121:
1678:
1419:"Perpetual Futility: A short history of the search for perpetual motion"
834:
1897:
1851:"codecs – Codec registry and base classes – Python 3.9.6 documentation"
864:
as the alphabet, ROT47 uses a larger set of characters from the common
1709:
811:
is an example of words that are both ROT13 reciprocals and reversals.
801:. Other examples of words like these are shown in the table. The pair
31:
2485:
2209:
2075:
1949:
1887:
1883:
1836:
1745:
1268:
846:
17:
2179:
2174:
1714:
1065:
869:
833:—that was the ROT13 encoding of the frequently encoded utterance "
469:
950:
803:
148:, then the sequence continues at the beginning of the alphabet:
2340:
1914:
1159:
Without importing any libraries, it can be done in a two-line
1596:. "Bad Cryptography in the Netscape Browser: A Case Study".
1068:, one can ROT13 the buffer or a selection with the commands
58:
that replaces a letter with the 13th letter after it in the
1741:
1310:
1000:# Map upper case A-Z to N-ZA-M and lower case a-z to n-za-m
1566:. PrĂĽfziffernberechnung in der Praxis. 25 September 2004.
841:" evolved in mid-1992 as a response to postings repeating
352:
A second application of ROT13 would restore the original.
243:{\displaystyle {\mbox{ROT}}_{13}({\mbox{ROT}}_{13}(x))=x}
900:
is not obvious at first sight from the scrambled result
382:
machines, pointed out that ROT13 encodes his surname as
1035:"The Quick Brown Fox Jumps Over The Lazy Dog"
1016:"The Quick Brown Fox Jumps Over The Lazy Dog"
85:
security, and is often cited as a canonical example of
2506:
Cryptographically secure pseudorandom number generator
1174:"Quartz glyph job vext cwm porshrop finks?!"
818:(IOCCC) included an entry by Brian Westley. Westley's
479:
210:
193:
1142:'The Quick Brown Fox Jumps Over The Lazy Dog'
190:
1902:
2618:
2374:
2283:
2255:
2227:
2167:
2129:
2061:
2035:
1992:
1959:
1948:
1364:(Second ed.). John Wiley & Sons. pp.
1054:"F:4< qC@H? u@I yF>AD ~G6C %96 {2KJ s@8
931:, a set of standard routines available for use in
922:%96 "F:4< qC@H? u@I yF>AD ~G6C %96 {2KJ s@8]
242:
378:, an 18th-century clockmaker and constructor of
1829:"Best of VIM Tips, gVIM's Key Features zzapper"
829:The newsgroup alt.folklore.urban coined a word—
124:, wrapping back to the beginning if necessary.
822:can be encoded in ROT13 or reversed and still
2352:
1926:
1394:The Codebreakers: The Story of Secret Writing
8:
1535:"How to Hide Email Addresses From Spam Bots"
1252:# Dhnegm tylcu wbo irkg pjz cbefuebc svaxf?!
912:The Quick Brown Fox Jumps Over The Lazy Dog.
1154:Gur Dhvpx Oebja Sbk Whzcf Bire Gur Ynml Qbt
1019:Gur Dhvpx Oebja Sbk Whzcf Bire Gur Ynml Qbt
69:Because there are 26 letters (2Ă—13) in the
2359:
2345:
2337:
1956:
1933:
1919:
1911:
1907:
1903:
1348:
1346:
1344:
1342:
1087:, one can ROT13 a buffer with the command
436:scheme; a critic might claim that "56-bit
1601:
216:
209:
199:
192:
189:
1494:
1492:
1490:
283:
172:. Only those letters which occur in the
1299:
1280:
816:International Obfuscated C Code Contest
420:ROT13 is not intended to be used where
277:The transformation can be done using a
1658:from the original on 20 December 2016
1450:"very mildly obscence joke, shift=13"
1307:Christopher Swenson (17 March 2008).
66:which was developed in ancient Rome.
7:
1632:from the original on 17 October 2014
1622:"Dimitry Sklyarov: Enemy or friend?"
1561:"On the 2ROT13 Encryption Algorithm"
1514:from the original on 13 January 2012
1429:from the original on 10 October 2020
1313:. John Wiley & Sons. p. 5.
448:In December 1999, it was found that
1861:from the original on 6 October 2020
345:Jul qvq gur puvpxra pebff gur ebnq?
334:Why did the chicken cross the road?
77:; that is, to undo ROT13, the same
1786:from the original on 2 August 2019
1776:The GNU C Library Reference Manual
1573:from the original on 15 April 2012
943:
397:ROT13 was in use in the net.jokes
250:for any basic Latin-alphabet text
25:
1752:from the original on 14 July 2014
1689:from the original on 2 April 2012
1327:from the original on 24 June 2016
969:. Like ROT13, XOR (and therefore
468:to conceal potentially offensive
62:. ROT13 is a special case of the
2694:
2693:
1805:"Rmail Rot13 – GNU Emacs Manual"
1722:from the original on 9 June 2012
1533:Ferner, Matt (9 December 2010).
1423:The Museum of Unworkable Devices
965:(XOR) operation. This effects a
1898:ROT13 to Text on PureTables.com
1886:for ROT13, ROT5, ROT18, ROT47,
1541:from the original on 8 May 2016
1471:utcsrgv!dave (8 October 1982).
1024:and the same string for ROT47:
360:ROT13 is a special case of the
2555:Information-theoretic security
1835:. 3 March 2016. Archived from
262:, this is sometimes called an
231:
228:
222:
205:
1:
1448:desoto!gog (8 October 1982).
476:Letter games and net culture
2671:Message authentication code
2626:Cryptographic hash function
2439:Cryptographic hash function
1417:Simanek, Donald E. (2012).
2745:
2550:Harvest now, decrypt later
1652:"ROT13 is used in Windows"
1502:, ed. (29 December 2003).
488:NOPQRSTUVWXYZABCDEFGHIJKLM
484:abcdefghijklmnopqrstuvwxyz
376:Johann Ernst Elias Bessler
2689:
2666:Post-quantum cryptography
2336:
1910:
1906:
482:
348:To get to the other side!
337:Gb trg gb gur bgure fvqr!
281:, such as the following:
2656:Quantum key distribution
2646:Authenticated encryption
2501:Random number generation
1780:Free Software Foundation
1165:
1109:
1026:
994:
462:software development kit
104:, puzzle solutions, and
50:", sometimes hyphenated
27:Simple encryption method
2651:Public-key cryptography
2641:Symmetric-key algorithm
2444:Key derivation function
2404:Cryptographic primitive
2397:Authentication protocol
2387:Outline of cryptography
2382:History of cryptography
1772:"5.13 Obfuscating Data"
1708:Westley, Brian (1989).
1396:. New York: Macmillan.
372:in the 1st century BC.
92:ROT13 has been used in
2392:Cryptographic protocol
1942:Classical cryptography
1537:. PracticalEcommerce.
1508:The Jargon File, 4.4.7
1074:M-x rot13-other-window
1010:'N-ZA-Mn-za-m'
244:
36:
2545:End-to-end encryption
2491:Cryptojacking malware
1810:24 March 2016 at the
1070:M-x toggle-rot13-mode
450:Netscape Communicator
268:; in cryptography, a
245:
96:as a means of hiding
54:) is a simple letter
35:
2661:Quantum cryptography
2585:Trusted timestamping
2301:Index of coincidence
2205:Reservehandverfahren
1620:(1 September 2001).
1360:Applied Cryptography
933:computer programming
849:was being overused.
466:Unix fortune program
394:, as his pseudonym.
362:encryption algorithm
188:
71:basic Latin alphabet
2424:Cryptographic nonce
2320:Kasiski examination
2315:Information leakage
1857:. 2 November 2023.
1782:. 3 December 2006.
1748:. 25 October 1995.
106:offensive materials
73:, ROT13 is its own
56:substitution cipher
48:rotate by 13 places
2530:Subliminal channel
2514:Pseudorandom noise
2461:Key (cryptography)
2296:Frequency analysis
2195:RasterschlĂĽssel 44
1161:list comprehension
957:pattern 00101010 (
866:character encoding
430:frequency analysis
240:
214:
197:
140:, and so on up to
37:
2724:Classical ciphers
2711:
2710:
2707:
2706:
2590:Key-based routing
2580:Trapdoor function
2451:Digital signature
2332:
2331:
2328:
2327:
2223:
2222:
1473:"encrypted jokes"
1320:978-0-470-13593-8
1045:'P-~\!-O'
967:simple XOR cipher
773:
772:
328:
327:
271:reciprocal cipher
213:
196:
16:(Redirected from
2736:
2729:Internet culture
2697:
2696:
2525:Insecure channel
2361:
2354:
2347:
2338:
1957:
1935:
1928:
1921:
1912:
1908:
1904:
1884:Online converter
1871:
1870:
1868:
1866:
1847:
1841:
1840:
1839:on 3 March 2016.
1825:
1819:
1802:
1796:
1795:
1793:
1791:
1768:
1762:
1761:
1759:
1757:
1738:
1732:
1731:
1729:
1727:
1705:
1699:
1698:
1696:
1694:
1677:De Mulder, Tom.
1674:
1668:
1667:
1665:
1663:
1654:. 24 July 2006.
1648:
1642:
1641:
1639:
1637:
1614:
1608:
1607:
1605:
1592:Hollebeek, Tim;
1589:
1583:
1582:
1580:
1578:
1572:
1565:
1557:
1551:
1550:
1548:
1546:
1530:
1524:
1523:
1521:
1519:
1500:Raymond, Eric S.
1496:
1485:
1484:
1468:
1462:
1461:
1445:
1439:
1438:
1436:
1434:
1414:
1408:
1407:
1386:
1380:
1379:
1363:
1350:
1337:
1336:
1334:
1332:
1304:
1292:
1285:
1253:
1250:
1247:
1244:
1241:
1238:
1235:
1232:
1229:
1226:
1223:
1220:
1217:
1214:
1211:
1208:
1205:
1202:
1199:
1196:
1193:
1190:
1187:
1184:
1181:
1178:
1175:
1172:
1169:
1155:
1152:
1149:
1146:
1143:
1140:
1137:
1134:
1131:
1128:
1125:
1122:
1119:
1116:
1113:
1107:text transform.
1106:
1102:
1090:
1079:
1078:M-x rot13-region
1075:
1071:
1055:
1052:
1049:
1046:
1043:
1039:
1036:
1033:
1030:
1020:
1017:
1014:
1011:
1008:
1007:'A-Za-z'
1004:
1001:
998:
945:
820:computer program
777:English language
480:
454:Dimitry Sklyarov
380:perpetual motion
323:
320:
317:
314:
302:
299:
296:
293:
284:
249:
247:
246:
241:
221:
220:
215:
211:
204:
203:
198:
194:
174:English alphabet
168:, which becomes
144:, which becomes
21:
2744:
2743:
2739:
2738:
2737:
2735:
2734:
2733:
2714:
2713:
2712:
2703:
2685:
2614:
2370:
2365:
2324:
2279:
2251:
2219:
2163:
2125:
2057:
2031:
1994:Polybius square
1988:
1952:
1944:
1939:
1880:
1875:
1874:
1864:
1862:
1849:
1848:
1844:
1827:
1826:
1822:
1812:Wayback Machine
1803:
1799:
1789:
1787:
1770:
1769:
1765:
1755:
1753:
1740:
1739:
1735:
1725:
1723:
1707:
1706:
1702:
1692:
1690:
1676:
1675:
1671:
1661:
1659:
1650:
1649:
1645:
1635:
1633:
1616:
1615:
1611:
1591:
1590:
1586:
1576:
1574:
1570:
1563:
1559:
1558:
1554:
1544:
1542:
1532:
1531:
1527:
1517:
1515:
1498:
1497:
1488:
1470:
1469:
1465:
1447:
1446:
1442:
1432:
1430:
1416:
1415:
1411:
1404:
1388:
1387:
1383:
1376:
1354:Schneier, Bruce
1352:
1351:
1340:
1330:
1328:
1321:
1306:
1305:
1301:
1296:
1295:
1290:
1286:
1282:
1277:
1260:
1255:
1254:
1251:
1248:
1245:
1242:
1239:
1236:
1233:
1230:
1227:
1224:
1221:
1218:
1215:
1212:
1209:
1206:
1203:
1200:
1197:
1194:
1191:
1188:
1185:
1182:
1179:
1176:
1173:
1170:
1167:
1157:
1156:
1153:
1150:
1148:'rot13'
1147:
1144:
1141:
1138:
1135:
1132:
1129:
1126:
1123:
1120:
1117:
1114:
1111:
1104:
1100:
1097:
1088:
1085:Vim text editor
1077:
1073:
1069:
1062:
1057:
1056:
1053:
1050:
1047:
1044:
1041:
1037:
1034:
1031:
1028:
1022:
1021:
1018:
1015:
1012:
1009:
1006:
1002:
999:
996:
991:
984:
979:
972:
947:
923:
913:
903:
902:Z'\c`d\gbh\eggd
899:
898:+1-415-839-6885
895:
891:
887:
883:
879:
876:' through 126 '
875:
863:
855:
840:
769:
765:
760:
756:
749:
745:
740:
736:
729:
725:
720:
716:
709:
705:
700:
696:
689:
685:
680:
676:
669:
665:
660:
656:
649:
645:
640:
636:
629:
625:
620:
616:
609:
605:
600:
596:
589:
585:
580:
576:
569:
565:
560:
556:
549:
545:
540:
536:
529:
525:
520:
516:
509:
505:
500:
496:
489:
486:
485:
478:
358:
324:
321:
318:
315:
312:
303:
300:
297:
294:
291:
208:
191:
186:
185:
171:
167:
164:, and so on to
163:
159:
155:
151:
147:
143:
139:
135:
131:
127:
118:
112:conversations.
87:weak encryption
28:
23:
22:
15:
12:
11:
5:
2742:
2740:
2732:
2731:
2726:
2716:
2715:
2709:
2708:
2705:
2704:
2702:
2701:
2690:
2687:
2686:
2684:
2683:
2678:
2676:Random numbers
2673:
2668:
2663:
2658:
2653:
2648:
2643:
2638:
2633:
2628:
2622:
2620:
2616:
2615:
2613:
2612:
2607:
2602:
2600:Garlic routing
2597:
2592:
2587:
2582:
2577:
2572:
2567:
2562:
2557:
2552:
2547:
2542:
2537:
2532:
2527:
2522:
2520:Secure channel
2517:
2511:
2510:
2509:
2498:
2493:
2488:
2483:
2481:Key stretching
2478:
2473:
2468:
2463:
2458:
2453:
2448:
2447:
2446:
2441:
2431:
2429:Cryptovirology
2426:
2421:
2416:
2414:Cryptocurrency
2411:
2406:
2401:
2400:
2399:
2389:
2384:
2378:
2376:
2372:
2371:
2366:
2364:
2363:
2356:
2349:
2341:
2334:
2333:
2330:
2329:
2326:
2325:
2323:
2322:
2317:
2312:
2298:
2293:
2287:
2285:
2281:
2280:
2278:
2277:
2272:
2267:
2261:
2259:
2253:
2252:
2250:
2249:
2244:
2239:
2233:
2231:
2225:
2224:
2221:
2220:
2218:
2217:
2212:
2207:
2202:
2200:Reihenschieber
2197:
2192:
2187:
2182:
2177:
2171:
2169:
2165:
2164:
2162:
2161:
2156:
2151:
2146:
2141:
2135:
2133:
2127:
2126:
2124:
2123:
2118:
2113:
2108:
2103:
2098:
2093:
2088:
2083:
2078:
2073:
2067:
2065:
2059:
2058:
2056:
2055:
2050:
2045:
2039:
2037:
2033:
2032:
2030:
2029:
2024:
2019:
2014:
2009:
2004:
1998:
1996:
1990:
1989:
1987:
1986:
1981:
1976:
1971:
1965:
1963:
1961:Polyalphabetic
1954:
1946:
1945:
1940:
1938:
1937:
1930:
1923:
1915:
1901:
1900:
1895:
1879:
1878:External links
1876:
1873:
1872:
1855:ww6.python.org
1842:
1833:rayninfo.co.uk
1820:
1797:
1763:
1733:
1700:
1669:
1643:
1609:
1603:10.1.1.15.9271
1584:
1552:
1525:
1486:
1463:
1440:
1409:
1402:
1381:
1374:
1338:
1319:
1298:
1297:
1294:
1293:
1288:
1279:
1278:
1276:
1273:
1272:
1271:
1266:
1259:
1256:
1166:
1110:
1096:
1093:
1061:
1058:
1042:'\!-~'
1027:
995:
987:
983:
980:
978:
977:Implementation
975:
970:
941:
925:
924:
921:
915:
914:
911:
901:
897:
893:
889:
885:
881:
877:
873:
861:
854:
851:
838:
771:
770:
767:
763:
761:
758:
754:
751:
750:
747:
743:
741:
738:
734:
731:
730:
727:
723:
721:
718:
714:
711:
710:
707:
703:
701:
698:
694:
691:
690:
687:
683:
681:
678:
674:
671:
670:
667:
663:
661:
658:
654:
651:
650:
647:
643:
641:
638:
634:
631:
630:
627:
623:
621:
618:
614:
611:
610:
607:
603:
601:
598:
594:
591:
590:
587:
583:
581:
578:
574:
571:
570:
567:
563:
561:
558:
554:
551:
550:
547:
543:
541:
538:
534:
531:
530:
527:
523:
521:
518:
514:
511:
510:
507:
503:
501:
498:
494:
491:
490:
487:
483:
477:
474:
386:. He used its
357:
354:
350:
349:
346:
339:
338:
335:
326:
325:
311:
309:
305:
304:
290:
288:
256:
255:
239:
236:
233:
230:
227:
224:
219:
207:
202:
169:
165:
161:
157:
153:
149:
145:
141:
137:
133:
129:
125:
117:
114:
60:Latin alphabet
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2741:
2730:
2727:
2725:
2722:
2721:
2719:
2700:
2692:
2691:
2688:
2682:
2681:Steganography
2679:
2677:
2674:
2672:
2669:
2667:
2664:
2662:
2659:
2657:
2654:
2652:
2649:
2647:
2644:
2642:
2639:
2637:
2636:Stream cipher
2634:
2632:
2629:
2627:
2624:
2623:
2621:
2617:
2611:
2608:
2606:
2603:
2601:
2598:
2596:
2595:Onion routing
2593:
2591:
2588:
2586:
2583:
2581:
2578:
2576:
2575:Shared secret
2573:
2571:
2568:
2566:
2563:
2561:
2558:
2556:
2553:
2551:
2548:
2546:
2543:
2541:
2538:
2536:
2533:
2531:
2528:
2526:
2523:
2521:
2518:
2515:
2512:
2507:
2504:
2503:
2502:
2499:
2497:
2494:
2492:
2489:
2487:
2484:
2482:
2479:
2477:
2474:
2472:
2471:Key generator
2469:
2467:
2464:
2462:
2459:
2457:
2454:
2452:
2449:
2445:
2442:
2440:
2437:
2436:
2435:
2434:Hash function
2432:
2430:
2427:
2425:
2422:
2420:
2417:
2415:
2412:
2410:
2409:Cryptanalysis
2407:
2405:
2402:
2398:
2395:
2394:
2393:
2390:
2388:
2385:
2383:
2380:
2379:
2377:
2373:
2369:
2362:
2357:
2355:
2350:
2348:
2343:
2342:
2339:
2335:
2321:
2318:
2316:
2313:
2310:
2306:
2302:
2299:
2297:
2294:
2292:
2289:
2288:
2286:
2284:Cryptanalysis
2282:
2276:
2273:
2271:
2268:
2266:
2263:
2262:
2260:
2258:
2257:Steganography
2254:
2248:
2245:
2243:
2240:
2238:
2235:
2234:
2232:
2230:
2226:
2216:
2213:
2211:
2208:
2206:
2203:
2201:
2198:
2196:
2193:
2191:
2188:
2186:
2183:
2181:
2178:
2176:
2173:
2172:
2170:
2166:
2160:
2157:
2155:
2152:
2150:
2147:
2145:
2142:
2140:
2137:
2136:
2134:
2132:
2131:Transposition
2128:
2122:
2119:
2117:
2114:
2112:
2109:
2107:
2104:
2102:
2099:
2097:
2094:
2092:
2089:
2087:
2084:
2082:
2079:
2077:
2074:
2072:
2069:
2068:
2066:
2064:
2060:
2054:
2051:
2049:
2046:
2044:
2041:
2040:
2038:
2034:
2028:
2025:
2023:
2020:
2018:
2015:
2013:
2010:
2008:
2005:
2003:
2000:
1999:
1997:
1995:
1991:
1985:
1982:
1980:
1977:
1975:
1972:
1970:
1967:
1966:
1964:
1962:
1958:
1955:
1951:
1947:
1943:
1936:
1931:
1929:
1924:
1922:
1917:
1916:
1913:
1909:
1905:
1899:
1896:
1893:
1892:Caesar cipher
1889:
1885:
1882:
1881:
1877:
1860:
1856:
1852:
1846:
1843:
1838:
1834:
1830:
1824:
1821:
1817:
1813:
1809:
1806:
1801:
1798:
1785:
1781:
1777:
1773:
1767:
1764:
1751:
1747:
1743:
1737:
1734:
1721:
1717:
1716:
1711:
1704:
1701:
1688:
1684:
1680:
1679:"ROT13 Words"
1673:
1670:
1657:
1653:
1647:
1644:
1631:
1627:
1623:
1619:
1618:Perens, Bruce
1613:
1610:
1604:
1599:
1595:
1588:
1585:
1569:
1562:
1556:
1553:
1540:
1536:
1529:
1526:
1513:
1509:
1505:
1501:
1495:
1493:
1491:
1487:
1482:
1478:
1474:
1467:
1464:
1459:
1455:
1451:
1444:
1441:
1428:
1424:
1420:
1413:
1410:
1405:
1403:0-684-83130-9
1399:
1395:
1391:
1385:
1382:
1377:
1375:0-471-11709-9
1371:
1367:
1362:
1361:
1355:
1349:
1347:
1345:
1343:
1339:
1326:
1322:
1316:
1312:
1311:
1303:
1300:
1284:
1281:
1274:
1270:
1267:
1265:
1264:Cryptanalysis
1262:
1261:
1257:
1164:
1162:
1121:>>>
1112:>>>
1108:
1094:
1092:
1086:
1081:
1067:
1060:Emacs and Vim
1059:
1025:
993:
990:
981:
976:
974:
968:
964:
960:
956:
952:
948:
938:
935:, contains a
934:
930:
929:GNU C library
920:
919:
918:
917:enciphers to
910:
909:
908:
905:
892:is mapped to
884:is mapped to
871:
867:
858:
852:
850:
848:
844:
836:
832:
827:
825:
821:
817:
812:
810:
806:
805:
800:
799:
794:
793:
788:
784:
783:
778:
762:
753:
752:
742:
733:
732:
722:
713:
712:
702:
693:
692:
682:
673:
672:
662:
653:
652:
642:
633:
632:
622:
613:
612:
602:
593:
592:
582:
573:
572:
562:
553:
552:
542:
533:
532:
522:
513:
512:
502:
493:
492:
481:
475:
473:
471:
467:
463:
459:
455:
451:
446:
444:
439:
435:
431:
427:
423:
418:
414:
412:
408:
407:Caesar cipher
404:
400:
395:
393:
389:
385:
381:
377:
373:
371:
370:Julius Caesar
367:
366:Caesar cipher
363:
355:
353:
347:
344:
343:
342:
336:
333:
332:
331:
322:abcdefghijklm
319:nopqrstuvwxyz
316:ABCDEFGHIJKLM
313:NOPQRSTUVWXYZ
310:
307:
306:
301:nopqrstuvwxyz
298:abcdefghijklm
295:NOPQRSTUVWXYZ
292:ABCDEFGHIJKLM
289:
286:
285:
282:
280:
275:
273:
272:
267:
266:
261:
253:
237:
234:
225:
217:
200:
184:
183:
182:
180:
175:
123:
115:
113:
111:
107:
103:
99:
95:
94:online forums
90:
88:
84:
83:cryptographic
80:
76:
72:
67:
65:
64:Caesar cipher
61:
57:
53:
49:
45:
41:
34:
30:
19:
2631:Block cipher
2476:Key schedule
2466:Key exchange
2456:Kleptography
2419:Cryptosystem
2368:Cryptography
2190:One-time pad
2115:
2063:Substitution
1863:. Retrieved
1854:
1845:
1837:the original
1832:
1823:
1815:
1800:
1788:. Retrieved
1775:
1766:
1754:. Retrieved
1736:
1724:. Retrieved
1713:
1703:
1693:19 September
1691:. Retrieved
1682:
1672:
1660:. Retrieved
1646:
1634:. Retrieved
1612:
1587:
1577:20 September
1575:. Retrieved
1555:
1543:. Retrieved
1528:
1518:19 September
1516:. Retrieved
1507:
1466:
1443:
1431:. Retrieved
1422:
1412:
1393:
1384:
1359:
1329:. Retrieved
1309:
1302:
1283:
1158:
1098:
1082:
1063:
1023:
1013:<<<
985:
963:exclusive or
961:) using the
940:
926:
916:
906:
859:
856:
830:
828:
813:
808:
802:
796:
790:
786:
780:
774:
447:
419:
415:
396:
391:
383:
374:
359:
351:
340:
329:
279:lookup table
276:
269:
263:
257:
251:
119:
91:
68:
51:
47:
43:
39:
38:
29:
2619:Mathematics
2610:Mix network
2242:Code talker
2121:Running key
2053:Four-square
1816:www.gnu.org
1710:"westley.c"
1662:15 December
1594:Viega, John
1390:Kahn, David
1099:The module
843:urban myths
364:known as a
260:mathematics
116:Description
2718:Categories
2570:Ciphertext
2540:Decryption
2535:Encryption
2496:Ransomware
2291:Cryptogram
2185:Kama Sutra
2154:Rail fence
2149:Myszkowski
2096:Chaocipher
2048:Two-square
2027:VIC cipher
1979:Trithemius
1636:3 February
1626:ZDNet News
1433:28 October
1291:newsgroup.
1275:References
1195:''
434:encryption
368:, used by
265:involution
102:punchlines
2560:Plaintext
2215:Solitaire
1953:by family
1865:7 October
1756:3 October
1726:13 August
1598:CiteSeerX
1481:net.jokes
1477:Newsgroup
1458:net.jokes
1454:Newsgroup
1331:5 October
1289:net.jokes
1103:provides
971:memfrob()
953:with the
907:Example:
868:known as
847:newcomers
814:The 1989
443:plaintext
411:spam bots
399:newsgroup
392:Orffyreus
388:latinised
110:newsgroup
79:algorithm
2699:Category
2605:Kademlia
2565:Codetext
2508:(CSPRNG)
2303:(Units:
2139:Columnar
2086:Beaufort
2043:Playfair
2017:Tap code
2012:Nihilist
1984:Vigenère
1859:Archived
1808:Archived
1790:2 August
1784:Archived
1750:Archived
1742:"Furrfu"
1720:Archived
1687:Archived
1656:Archived
1630:Archived
1568:Archived
1539:Archived
1512:Archived
1427:Archived
1356:(1996).
1325:Archived
1258:See also
937:function
888:, while
853:Variants
824:compiles
160:becomes
152:becomes
136:becomes
128:becomes
122:alphabet
98:spoilers
44:Rotate13
2375:General
2081:Autokey
1969:Alberti
1950:Ciphers
1683:Furrfu!
1545:12 June
1504:"ROT13"
1479::
1456::
1105:'rot13'
1083:In the
798:purpura
792:Chechen
787:nowhere
782:abjurer
768:nowhere
764:abjurer
739:Chechen
735:purpura
422:secrecy
403:spoiler
384:Orffyre
308:Output
179:inverse
75:inverse
2486:Keygen
2270:Grille
2210:Slidex
2144:Double
2111:Pigpen
2091:Caesar
2076:Atbash
2071:Affine
2036:Square
2022:Trifid
2002:ADFGVX
1974:Enigma
1888:Atbash
1746:Foldoc
1600:
1400:
1372:
1317:
1269:Atbash
1246:string
1234:string
1189:string
1168:string
1136:encode
1130:codecs
1118:codecs
1115:import
1101:codecs
1095:Python
955:binary
839:Furrfu
835:sheesh
831:furrfu
789:, and
668:cheryl
664:purely
460:eBook
390:form,
287:Input
52:ROT-13
2516:(PRN)
2265:Bacon
2229:Codes
2180:DRYAD
2175:BATCO
2168:Other
2159:Route
2116:ROT13
2101:Great
2007:Bifid
1715:IOCCC
1571:(PDF)
1564:(PDF)
1240:print
1124:print
1089:ggg?G
1076:, or
1066:Emacs
870:ASCII
748:FUBAR
744:shone
708:green
704:terra
699:sheol
695:furby
659:pyrex
655:clerk
470:dicta
458:Adobe
356:Usage
40:ROT13
18:Ebg13
2307:and
2275:Null
2247:Poem
2237:Book
2106:Hill
1890:and
1867:2020
1792:2019
1758:2016
1728:2007
1695:2007
1664:2016
1638:2011
1579:2007
1547:2014
1520:2007
1435:2020
1398:ISBN
1370:ISBN
1333:2015
1315:ISBN
1228:char
1222:char
1219:else
1216:abcd
1210:char
1201:join
1180:abcd
1032:echo
951:byte
944:frob
927:The
837:". "
809:tang
807:and
804:gnat
795:and
785:and
779:are
759:Nerf
755:Ares
719:Jung
715:what
639:tang
635:gnat
608:sync
604:flap
599:reef
595:errs
579:rail
575:envy
568:roof
564:ebbs
539:ones
535:barf
519:onyx
515:balk
2309:Nat
2305:Ban
1225:for
1177:for
1064:In
1029:$
1003:$
997:$
942:mem
862:A–Z
728:hey
724:URL
688:fun
684:SHA
679:cat
675:PNG
648:vex
644:irk
628:try
624:gel
619:she
615:fur
559:ova
555:bin
528:one
524:bar
508:nag
504:ant
499:nun
495:aha
438:DES
426:key
274:).
212:ROT
195:ROT
46:, "
2720::
1853:.
1831:.
1814:.
1778:.
1774:.
1744:.
1718:.
1712:.
1685:.
1681:.
1628:.
1624:.
1510:.
1506:.
1489:^
1475:.
1452:.
1425:.
1421:.
1392:.
1368:.
1366:11
1341:^
1323:.
1237:])
1231:in
1213:in
1207:if
1183:in
1163::
1151:))
1091:.
1080:.
1072:,
1051:96
1040:tr
1005:tr
989:tr
982:tr
959:42
946:()
766:↔
757:↔
746:↔
737:↔
726:↔
717:↔
706:↔
697:↔
686:↔
677:↔
666:↔
657:↔
646:↔
637:↔
626:↔
617:↔
606:↔
597:↔
588:re
586:↔
584:er
577:↔
566:↔
557:↔
548:or
546:↔
544:be
537:↔
526:↔
517:↔
506:↔
497:↔
472:.
218:13
201:13
181::
156:,
132:,
100:,
89:.
2360:e
2353:t
2346:v
2311:)
1934:e
1927:t
1920:v
1894:.
1869:.
1818:.
1794:.
1760:.
1730:.
1697:.
1666:.
1640:.
1606:.
1581:.
1549:.
1522:.
1483:.
1460:.
1437:.
1406:.
1378:.
1335:.
1249:)
1243:(
1204:(
1198:.
1192:=
1186::
1171:=
1145:,
1139:(
1133:.
1127:(
1048:%
1038:|
939:—
894:2
890:a
886:p
882:A
878:~
874:!
254:.
252:x
238:x
235:=
232:)
229:)
226:x
223:(
206:(
170:M
166:Z
162:B
158:O
154:A
150:N
146:Z
142:M
138:O
134:B
130:N
126:A
42:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.