Knowledge (XXG)

Talk:Caesar cipher

Source 📝

1877:
probably should have filled in more fields back in the day when I had time, but I expected the fields to be filled in due time in the generally accepted spirit of eventualism. Also, the infoboxes generally help the articles inside the subject matters. Though, I admit I did pick the just about only infobox template that I could find at the time, and that particular one was best geared for modern ciphers. Are there better suited infoboxes for ancient ciphers before the modern distinctions and classifications? Please advise, this article (like articles of other old ciphers) looks quite bleak without an appropriate infobox. --
2295:. I don't think these add anything meaningful to the article. The algorithm for the Caesar cipher is so simple it can be encapsulated in one simple formula, as in the "Example" section. Any well-written code example will also only have one line devoted to the actual enciphering, which is the same as the formula given earlier. Most of the code is invariably devoted to iterating through the input string, converting the string characters into numbers, and assembling the output, instead of implementing the actual cipher itself. As a result the reader doesn't gain anything from reading the example. 342: 777:
powerful and famous (just consider authorship credits on papers written by graduate students, no), and this pollutes the attribution space with lots of squirrely data. JC would seem to have been an enthusiastic user in a military context and a powerful and famous guy generally, so things may have stuck. That we no longer have that Roman book on crypto is unfortunate for this. If we simply say that single alph sub cypher wasn't his, we would certainly be safe.
190: 333: 223: 571: 624: 532: 393: 472: 445: 375: 1876:
It's been over a year since you left the comment! As the person who added the infobox in question in the first place (I think, my memory is hazy), I guess I should comment, as is the norm in case of the absurdities of Knowledge (XXG). Anyway: I do agree that there weren't many fields filled in, and I
1798:
Kudos to Hut8.5 for his cleanup and tracking down some sources for this article. I'm a bit worried, though, by the Daily Mail cite -- the newspaper is not a particularly scholarly source. I wouldn't at all be surprised, for example, if the Daily Mail had used Knowledge (XXG) as a source itself (given
1430:
OK, good point. Perhaps, then, we should go the route of explicitly defining "mod" as you suggest, in the interests of keeping the encryption and decryption formulae simple. The alternative is to add 26 to the formula to ensure it's positive, but that might be less clear to the reader. As it's really
878:
without checking. Do the other ones work? You are most definitely allowed to change even featured articles, and especially if they've got (cough) mistakes in them ;-) While checking, I also noticed that "AFCCP" could also become "diffs" (which isn't a dictionary word, of course, but it's a common bit
799:
The History section relates cryptanalysis of the caesar cipher and frequency analysis. That's the nice way to do it, but since brute force is so trivial and obvious for this cipher, can we really even talk about "methods of breaking the cipher" being unavailable? I mean, it's a *Caesar cipher*. :)
1989:
I disagree with the removal. Including neutral encyclopedic coverage of an organised crime figure in a location where that content is relevant is not in any sense promotional. The article does not imply that Provenzano is a historical figure with comparable stature to Caesar, just that both of these
1856:
I have just removed the infobox from this page. It has been around since 2007 and I am surprised that no one has complained about it. It's use for modern encryption schemes is fine, the template was designed for that. In this instance however, too few fields are filled in and the result looks like a
1517:
Heh, yes, I got muddled — early morning editing is never a strong point for me. But I do think it's ambiguous, and certainly all the books (I've read) on the history of cryptography read it being a right shift. They may well all be mistaken, but I think our best option is to just omit specifying the
1059:
category. Does it really qualify? Beacuse it doesn't do what is described on the stream cipher's article "the transformation of successive digits varies during the encryption." I think I could argue it either way (it's just a really simple stream cipher), but I thought someone should at least bring
865:
One of the examples in the article stated that "AFCCQ" would rotate to either "jolly" or "cheer". It doesn't; it rotates to "jollz" and "chees". I fixed the example to read "AFCCP" instead. This is my first edit of a featured article in particular, so I hope I wasn't meant to go through any sort of
776:
Matt, The timeline in progress notes earlier uses of single alphabet substitution cyphers (eg, Atbash) and I think I remember that the Egyptian carving thing from thousands of years earlier was such a thing (but don't count on it). The problem would seem to be that many things get attributed to the
2269:
I've removed this as I don't think it adds anything to the article. Knowledge (XXG) isn't a source code repository, code is only included if it significantly enhances the reader's understanding of the topic. The Caesar cipher is so simple that even small children can easily grasp the algorithm, it
1522:
extant et ad Ciceronem, item ad familiares domesticis de rebus, in quibus, si qua occultius perferenda erant, per notas scripsit, id est sic structo litterarum ordine, ut nullum verbum effici posset: quae si qui investigare et persequi velit, quartam elementorum litteram, id est D pro A et perinde
1034:
this month, where they had a feature on websites about codes and ciphers. Apparently, "they select a topic, in this case Codes and Ciphers, and present websites that they believe will be helpful to students and teachers. Each one has a short summary/review". The review for this article was, "This
889:
Ha! I love it when I find mistakes in published books. :P As far as I can see, the others are fine, although I wonder at the "attackatonce" example table, as the shifts are in reverse order. From "exxegoexsrgi", the text "attackatonce" would technically be a shift of 22, not 4. Or am I misreading
734:
are not the same kind of puzzle at all. A cryptic crossword is a crossword with particular styles of clues. It does not involve any encryption. A cryptogram is a piece of text which has been encrypted with a simple substitution cipher (each letter replaced throughout with some other letter). It's
2199:
Quite some time ago, I created a Caesar cipher decryption tool, based on a frequency heuristic, where you can paste some text and the right key is guessed. The tool is the most linked and most frequently visited page of my blog, which might be a slight indicator, that people see in it a valuable
1483:
Yeah, it seems ambiguous, depending on what "substitute for" means. To my mind, if you substitute D for A, it could well mean that you replace A with D. This is the interpretation taken by Kahn and others. I wonder if the original language is clearer? I think we're safer just describing Caesar's
997:
talking about the Caesar cipher as described in this article, because the article goes into quite some detail about how to break those...perhaps you mean a shift cipher where the shift can vary with each letter, as opposed to being fixed? If the shift varies according to a repeating keyword, the
1833:
I'd like to add something about the last sentence of the article "In mathematical terms, the encryption under various keys forms a group." I think that it should be reformulated. Actually, saying that the encryption forms a group means nothing to me. It would be better to write that the set of
1162:
cryptography since ca 1000CE when the Arabs discovered frequency analysis. This ineffectiveness (ie, complete fecklessness) is so, even if a particular Opponent is a tad slow and hasn't heard of frequency analysis. As is often quipped, it "may be good enough for keeping your kid sister out" of
2216:
However, as I wrote, I don't think this is an advertising other than bringing in a valuable reference to Knowledge (XXG) and so I would be glad if you add the link permanently if the resource meeds your quality demands. I assure that this link will be available and that I own the site.
636: 2081:
I've reverted the edit. The point made by the source isn't that the cipher was executed imperfectly, it's that the cipher itself is extremely insecure (which explains why there are so few modern examples). If you'd like to rephrase it to emphasise that then I could go along with it.
1449:
I'm not a cryptographer but my reading of Suetonius is that Julius Ceasar's code was a shift of -3, or three to the left. The examples given, while not specifically being noted as having Caesar's shift do have a shift of three, but three to the right. For example, in the example:
2020:
It would make more sense to see more positive modern uses of this cipher rather than the examples given. So it is not really neutral and according to the source it is more anecdotal than encyclopedic. However, would you both agree to an edit of the sentence rather than a
1940:
In April 2006, fugitive Mafia boss Bernardo Provenzano was captured in Sicily partly because some of his messages, written in a variation of the Caesar cipher, were broken. Provenzano's cipher used numbers, so that "A" would be written as "4", "B" as "5", and so on.
984:
Where could I find an advanced caesar Cipher breaker? I need it to figure out strings such as delta=-?,+?,-?,+?,-?,+?,... and possibly do it backwards for me too. I have no idea where to even begin to break a cipher in which the delta is unknown!!!
1112:
Could someone write about the cipher's relevance today? When learning cryptographic methods, one inevitably is told of the Caesar Cipher. Perhaps someone should write about how it's used as a building block on developing more complex methods...
764:
I've had a quick thumb through Kahn (and the Internet), but I can't find any reference to shift ciphers before Caesar; I don't think we can say "certainly not invented by him", or can we? An NSA page (admittedly for kids) attributes it to him:
2336:
This older featured article contains a proportionately significant amount of uncited text, and the history section is largely a list of events that aren't connected well. Modern FAs have higher expectations for sourcing and structure, and a
840:
I just wanted to congratulate the authors of this article. Although a very simple topic, they've really done a great job of explaining it while using it as a demonstration of simple cryptography and cryptanalysis. I'm impressed.
2051:. We could also replace "badly" with "clumsily", as that term appears in the title of the article, but I think "badly" pretty well covers the tone and the content of the source. Good job, and welcome to collaborative editing! - 153: 2380: 1963:, as you said. I don't think it popularises the group. In my opinion it is a short, neutral, properly sourced, and sufficiently relevant example of the article subject. After all, we also have an article on 522: 2375: 1857:
malformed infobox. If you feel that for uniformity there should be an infobox on this page, then don't use the template, just build one as a table so that it can be customized for this cipher.
303: 284: 2405: 2270:
doesn't need code to explain it. Most of the code which was added related to the practicalities of handling different types of string characters rather than the actual algorithm itself.
1464:
This implies to me that to read the encoded text you would substitute the letter D whenever the letter A is encountered in the cipher. The example above the result would be an X for A.
1692: 1620: 1758: 1357: 265: 204: 229: 1389: 901:
the ciphertext with it — a decryption is a shift in the opposite direction to encryption (left shift). I've changed the heading of the table, hopefully it makes it clearer?
2430: 1275: 546: 2395: 1504:"To my mind, if you substitute D for A, it could well mean that you replace A with D." Yes, that is exactly what it means. But note that Seutonius is describing how to 1313: 1508:
the message, not how to encrypt it. Therefore the cipher is a left shift. It's not ambiguous at all. Unless the translation is wrong, but why would we suspect that?
1210: 147: 411: 1907:
touches on a point: Infoboxes also serve a purpose for classification and distinction. That's something that could be improved in this article, as I will write below.
2435: 2420: 2410: 1230: 512: 346: 79: 1417: 2445: 2390: 2425: 400: 380: 2440: 2247:
Hey there i have implemented the algorithm in python, perhaps it will help the programmers to understand how it works. Please feel free to comment here
1461:
From Suetonius: "If anyone wishes to decipher these ... he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others."
488: 1035:
Knowledge (XXG) article shows you how the Caesar Cipher works, and how to break it! It also explains some of the history of how Julius Caesar used it"
897:
It depends which way you're looking at it: if you're viewing it as a brute force attack, you're trying each possible encryption key (right shift), and
707:
For Caesar, the keyspace was even smaller: {0, 1, 2, ..., 23}, where 0 and 23 are identical and 'do nothing' (as pointed out by Marcika). According to
648: 541: 455: 2400: 85: 2415: 1920:
Striking my last two sentences, because I don't want to jump to the conclusion that just because I overlooked something it wasn't clear enough. ◄
2370: 2317: 44: 935:
I've tried central alignment, which (personally) I think looks slightly better in the wide column, but I don't really mind much either way.
479: 450: 2254: 30: 812:". Perhaps here, though, it was assumed that "the enemy doesn't know the system", in which case frequency analysis would be very useful. 1129: 1090:
I added the Vigenere cipher to the category though, I think that is proper (I'd say Vigenere is the most simple of the stream ciphers).
678: 99: 1078:
I've removed the category; it's not really a stream cipher, not in how people would normally understand and use the term, at least.
104: 20: 1897:
In my eyes, the article doesn't look bleak as it is. If anything, the removal of the 4 apparently unmotivated lines (as last seen
2385: 911:
It makes sense now, yes, but now it seems that the column is too wide. Would just "Decryption shift" or "Reverse shift" work? --
74: 1944:
This is because it doesn't really add to the article and popularises a modern crime figure compared with a historical leader.
1036: 355: 1799:
that this article was featured on Knowledge (XXG)'s main page a couple of weeks before the newspaper article was published).
1277:
can be either -2 or 3. Which of this two values is used depends widely on the context, where the operator is used. In crypto
199: 168: 65: 1888: 135: 742:
page suggests, those are called "cryptograms" in Dutch, that might be part of the confusion. The intended reference in
1990:
people made use of the cipher. I also don't see how someone could think that it "doesn't really add to the article".
222: 2232: 1518:
direction of the shift of the historical cipher in the article. For reference, the original Latin was apparently:
109: 693:
The set {1, 2, ... 26}, being all the possible offsets. Not much of a challenge, even for a human computer! --
2321: 2258: 332: 189: 129: 1837:
Finally, i'd like to say that i'm french so maybe I misunderstood the sentence ! Sorry if this is the case. --
361: 209: 1631: 1559: 1125: 682: 2313: 2250: 2220: 1703: 1117: 674: 575: 2172: 2026: 1949: 125: 1842: 1318: 55: 1121: 1097: 1067: 487:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
410:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
810:
furthermore, there is no record that any method was then known which would reliably break such a cipher
70: 1421: 2203:
As Knowledge (XXG) is a collection of valuable resources and information, I proposed to add the tool
1812:
I didn't realise that. Feel free to remove it - it was the only one I could find for that statement.
708: 175: 1014:
You understood puuurrfectleee... thanks! I am trying to solve an internet riddle thingie lol...
213: 1964: 1768: 1465: 1015: 986: 825: 820:
Hmm..yeah, having thought about it, perhaps this cryptanalysis section would be better merged into
161: 2291:
This article often gets implementations of the cipher in common programming languages added, e.g.
928:
Sounds good. I also right-aligned the numbers so that it looks better. Are you happy with this? --
759:
Others are known to have used such ciphers before Caesar, so it was certainly not invented by him.
2351: 1921: 1912: 1862: 1362: 821: 747: 694: 656: 627:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
2224: 1239: 2168: 2022: 1945: 1884: 1280: 1158:
I'd rephrase that a bit. The Caesar cypher and all its relatives before and after hasn't been
739: 731: 640: 51: 2342: 1163:
things, but not for much else. Newspaper puzzles maybe; at least the less challangeing sort.
1800: 1530: 1485: 1432: 1183: 1143: 1091: 1079: 1061: 1039: 1003: 953: 936: 919: 902: 880: 850: 829: 813: 785: 769: 2338: 141: 1783: 999: 712: 1180:
There have been a couple of incorrect reverts. There is no generally used definition of
2228: 2126: 2056: 1976: 1838: 1764: 1056: 1215: 2364: 2346: 1968: 1909: 1858: 946: 929: 912: 891: 867: 842: 801: 711:, the alphabet didn't contain more than 23 characters after the first century B.C. -- 652: 24: 1394: 945:
Centre alignment works too. ;) Would it be worth centering the plaintext as well? --
2298: 2273: 2085: 2015: 1993: 1904: 1879: 1814: 701: 484: 766: 700:
Actually, it is only the set {1 ... 25} - ROT26 not being much of a cipher :) -
623: 2210:
Unfortunately, the change was reverted automatically as I got explained here:
1779: 1509: 1475: 2204: 2162: 2122: 2052: 1972: 1233: 531: 1763:
All these are featured articles. So, which formula is correct in the end?
735:
meant to be solved by frequency analysis and recognizing letter patterns.
1420:). To be correct the article should clearly state the definition of mod. 1164: 778: 471: 444: 392: 374: 2356: 2325: 2305: 2280: 2262: 2236: 2176: 2130: 2092: 2060: 2030: 2000: 1980: 1953: 1924: 1915: 1892: 1866: 1846: 1834:
ciphers, with the law of composition for applications, forms a group.
1820: 1806: 1787: 1772: 1536: 1512: 1491: 1484:
cipher with a shift of three, rather than specifying which direction.
1478: 1468: 1438: 1424: 1167: 1149: 1085: 1072: 1045: 715: 686: 660: 404:, a collaborative effort to improve the coverage of articles that are 406: 866:
process for it; something I only thought about after I'd done so. --
1139: 2211: 1778:
They're all right. It depends on the alphabet, of course. --
918:
I've changed it to "Decryption shift", which is a bit smaller.
2047:
I noticed that you made a slight change, by adding the phrase
874:
Thanks for spotting this! I copied it mindlessly from Bauer's
562: 326: 15: 530: 2381:
Featured articles that have appeared on the main page once
746:
article is to what is called a cryptogram in English.) --
1431:
just a technicality, we could even do it in a footnote.
228:
This article appeared on Knowledge (XXG)'s Main Page as
2292: 2048: 1960: 1898: 599: 593: 587: 581: 296: 277: 258: 1002:. Have I understood correctly what you're describing? 160: 2376:
Featured articles that have appeared on the main page
1706: 1634: 1562: 1398: 1365: 1321: 1283: 1242: 1218: 1186: 618:
Wiki Education Foundation-supported course assignment
2406:
Knowledge (XXG) level-5 vital articles in Technology
2119:
clumsily written in a variation of the Caesar cipher
483:, a collaborative effort to improve the coverage of 174: 1752: 1686: 1614: 1410: 1383: 1351: 1307: 1269: 1224: 1204: 420:Knowledge (XXG):WikiProject Spoken Knowledge (XXG) 1961:"because it popularises an organised crime group" 1030:This article got recommended in an a feature in 33:for general discussion of the article's subject. 1967:. So I have restored the content, as did user 784:I've added a (somewhat cautious) replacement. 767:http://www.nsa.gov/kids/ciphers/ciphe00002.htm 1142:, but that's not really cryptography per se. 879:of jargon on Knowledge (XXG) and elsewhere). 8: 2396:Knowledge (XXG) vital articles in Technology 730:A cryptogram (in the English meaning) and a 212:. Even so, if you can update or improve it, 208:as one of the best articles produced by the 202:; it (or a previous version of it) has been 423:Template:WikiProject Spoken Knowledge (XXG) 2311: 2248: 2218: 672: 439: 369: 237: 184: 2431:High-importance Computer science articles 2341:may be necessary if improvements towards 2205:https://www.xarg.org/tools/caesar-cipher/ 1711: 1705: 1639: 1633: 1567: 1561: 1397: 1364: 1331: 1320: 1282: 1241: 1217: 1185: 649:Template:Dashboard.wikiedu.org assignment 2117:Yes, fair enough. Perhaps we could say " 1687:{\displaystyle D_{n}(x)=(x-n)\mod {26}.} 1615:{\displaystyle D_{n}(x)=(x-n)\mod {31}.} 497:Knowledge (XXG):WikiProject Cryptography 330: 2212:https://en.wikipedia.org/User_talk:Xarg 1745: 1743: 1679: 1677: 1607: 1605: 1300: 1298: 1262: 1260: 1197: 1195: 808:Sure ;) I presume you're referring to " 647:Above undated message substituted from 441: 371: 2446:Knowledge (XXG) pages with to-do lists 2391:Knowledge (XXG) level-5 vital articles 1971:. What do other contributors think? - 1753:{\displaystyle D_{n}(x)=x-n\mod {27}.} 2436:WikiProject Computer science articles 2421:High-importance Cryptography articles 2411:FA-Class vital articles in Technology 7: 1529:(Not that I can read a word of it). 1352:{\displaystyle y\equiv x{\pmod {n}}} 671:What is key space in caesar cipher? 477:This article is within the scope of 398:This article is within the scope of 2243:Implemented the algorithm in python 1457:Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC 1454:Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ 360:It is of interest to the following 23:for discussing improvements to the 2426:FA-Class Computer science articles 1937:I would like to remove this line: 632: 628: 401:WikiProject Spoken Knowledge (XXG) 14: 2441:WikiProject Cryptography articles 2371:Knowledge (XXG) featured articles 1340: 500:Template:WikiProject Cryptography 50:New to Knowledge (XXG)? Welcome! 2207:for the external pages section. 1959:Yes, you removed it a few times 1176:mod operator is not well defined 1138:Well, it's not, really. There's 828:; most of it is pretty general. 635:. Further details are available 622: 569: 470: 443: 391: 373: 340: 331: 221: 188: 45:Click here to start a new topic. 2401:FA-Class level-5 vital articles 1553:In the Romanian article it is: 849:Thanks for your kind comments! 517:This article has been rated as 426:Spoken Knowledge (XXG) articles 2416:FA-Class Cryptography articles 1847:01:20, 29 September 2008 (UTC) 1723: 1717: 1697:And in the Spanish one it is: 1669: 1657: 1651: 1645: 1625:In the English article it is: 1597: 1585: 1579: 1573: 1345: 1334: 1252: 1243: 1: 2357:13:54, 1 September 2022 (UTC) 2326:01:06, 18 November 2021 (UTC) 1738: 1672: 1600: 1439:09:33, 12 December 2006 (UTC) 1425:09:21, 12 December 2006 (UTC) 1332: 1315:is usually defined such that 1293: 1255: 1190: 1086:15:47, 22 November 2005 (UTC) 1073:22:52, 21 November 2005 (UTC) 1046:18:25, 1 September 2005 (UTC) 716:20:48, 26 February 2006 (UTC) 539:This article is supported by 491:and see a list of open tasks. 414:and see a list of open tasks. 42:Put new text under old text. 1901:) took away some bleakness. 1893:02:32, 21 October 2016 (UTC) 1867:04:00, 13 October 2015 (UTC) 1549:Correct mathematical formula 1384:{\displaystyle 0\leq y<n} 661:16:31, 16 January 2022 (UTC) 542:WikiProject Computer science 998:scheme is usually called a 2462: 2306:15:38, 26 April 2020 (UTC) 1925:12:00, 24 April 2018 (UTC) 1916:11:39, 24 April 2018 (UTC) 1788:18:48, 28 March 2008 (UTC) 1773:17:26, 28 March 2008 (UTC) 1270:{\displaystyle (-2)\mod 5} 989:05:06, Jun 21, 2005 (UTC) 949:16:05, Apr 12, 2005 (UTC) 932:15:59, Apr 12, 2005 (UTC) 915:15:48, Apr 12, 2005 (UTC) 894:15:32, Apr 12, 2005 (UTC) 870:15:14, Apr 12, 2005 (UTC) 687:06:48, 29 April 2003 (UTC) 266:Featured article candidate 2237:03:15, 21 July 2018 (UTC) 2177:15:11, 8 April 2016 (UTC) 2159:That's a good compromise 2131:06:55, 8 April 2016 (UTC) 2093:06:49, 8 April 2016 (UTC) 2061:06:42, 8 April 2016 (UTC) 2031:22:20, 7 April 2016 (UTC) 2001:21:19, 7 April 2016 (UTC) 1981:20:51, 7 April 2016 (UTC) 1954:20:40, 7 April 2016 (UTC) 1821:18:36, 16 June 2008 (UTC) 1807:18:14, 16 June 2008 (UTC) 1537:06:31, 17 July 2007 (UTC) 1513:05:30, 17 July 2007 (UTC) 1492:05:23, 17 July 2007 (UTC) 1479:03:33, 17 July 2007 (UTC) 1469:02:54, 17 July 2007 (UTC) 1308:{\displaystyle y=x\mod n} 1168:13:28, 18 June 2006 (UTC) 1150:07:43, 18 June 2006 (UTC) 1018:18:46, Jun 22, 2005 (UTC) 942:16:04, 12 Apr 2005 (UTC) 925:15:55, 12 Apr 2005 (UTC) 908:15:43, 12 Apr 2005 (UTC) 886:15:23, 12 Apr 2005 (UTC) 845:03:24, 12 Apr 2005 (UTC) 832:00:45, 24 Nov 2004 (UTC) 704:02:18, 12 Apr 2005 (UTC) 538: 516: 465: 386: 368: 317: 240: 236: 210:Knowledge (XXG) community 80:Be welcoming to newcomers 2281:20:56, 4 July 2019 (UTC) 2263:14:06, 4 July 2019 (UTC) 2049:"badly executed version" 1009:13:57, 21 Jun 2005 (UTC) 959:16:09, 12 Apr 2005 (UTC) 856:12:02, 12 Apr 2005 (UTC) 804:21:21, 2 Aug 2004 (UTC) 781:16:27, 2 Aug 2004 (UTC) 772:04:57, 2 Aug 2004 (UTC) 697:23:49 29 Jun 2003 (UTC) 480:WikiProject Cryptography 230:Today's featured article 2386:FA-Class vital articles 2339:featured article review 2293:this JavaScript example 1232:is negative. E.g., the 1205:{\displaystyle x\mod n} 1055:This article is in the 1023:Article recommended in 816:00:49, 3 Aug 2004 (UTC) 788:00:58, 3 Aug 2004 (UTC) 304:Featured article review 285:Featured article review 1754: 1688: 1616: 1413: 1385: 1353: 1309: 1271: 1226: 1206: 1032:School Library Journal 1025:School Library Journal 952:Might as well - done. 535: 417:Spoken Knowledge (XXG) 381:Spoken Knowledge (XXG) 75:avoid personal attacks 1755: 1689: 1617: 1474:Good point - fixed. 1414: 1411:{\displaystyle n: --> 1386: 1354: 1310: 1272: 1227: 1207: 639:. Student editor(s): 534: 503:Cryptography articles 354:on Knowledge (XXG)'s 347:level-5 vital article 100:Neutral point of view 1704: 1632: 1560: 1396: 1363: 1319: 1281: 1240: 1216: 1184: 105:No original research 2287:Programming samples 2167:. I'll put that in. 1965:Bernardo Provenzano 1933:Removal of Sentence 1445:Misleading Example? 826:substitution cipher 1874:(checks the clock) 1750: 1746: 1744: 1739: 1684: 1680: 1678: 1673: 1612: 1608: 1606: 1601: 1523:reliquas commutet. 1408: 1381: 1349: 1341: 1333: 1305: 1301: 1299: 1294: 1267: 1263: 1261: 1256: 1222: 1202: 1198: 1196: 1191: 1108:Relevance Today... 822:frequency analysis 637:on the course page 604:Updated 2011-04-30 536: 356:content assessment 241:Article milestones 232:on April 12, 2005. 86:dispute resolution 47: 2328: 2316:comment added by 2265: 2253:comment added by 2239: 2223:comment added by 1804: 1794:Daily Mail source 1534: 1489: 1436: 1225:{\displaystyle x} 1147: 1134: 1120:comment added by 1083: 1043: 1007: 957: 940: 923: 906: 884: 876:Decrypted Secrets 854: 740:cryptic crossword 732:cryptic crossword 726:Explaining revert 689: 677:comment added by 615: 614: 561: 560: 557: 556: 553: 552: 438: 437: 434: 433: 325: 324: 313: 312: 183: 182: 66:Assume good faith 43: 2453: 2301: 2276: 2166: 2088: 2019: 1996: 1859:Bill Cherowitzo 1802: 1759: 1757: 1756: 1751: 1716: 1715: 1693: 1691: 1690: 1685: 1644: 1643: 1621: 1619: 1618: 1613: 1572: 1571: 1532: 1487: 1434: 1419: 1416: 1415: 1409: 1390: 1388: 1387: 1382: 1358: 1356: 1355: 1350: 1348: 1314: 1312: 1311: 1306: 1276: 1274: 1273: 1268: 1231: 1229: 1228: 1223: 1211: 1209: 1208: 1203: 1145: 1133: 1114: 1081: 1041: 1005: 980:Advanced Breaker 955: 938: 921: 904: 882: 852: 663: 634: 630: 626: 602: 573: 572: 563: 523:importance scale 505: 504: 501: 498: 495: 474: 467: 466: 461: 458: 456:Computer science 447: 440: 428: 427: 424: 421: 418: 395: 388: 387: 377: 370: 353: 344: 343: 336: 335: 327: 320:Featured article 318:Current status: 299: 280: 261: 238: 225: 200:featured article 192: 185: 179: 178: 164: 95:Article policies 16: 2461: 2460: 2456: 2455: 2454: 2452: 2451: 2450: 2361: 2360: 2355: 2334: 2318:209.216.186.111 2299: 2289: 2274: 2245: 2197: 2195:Decryption Tool 2160: 2086: 2013: 1994: 1935: 1854: 1829: 1796: 1707: 1702: 1701: 1635: 1630: 1629: 1563: 1558: 1557: 1551: 1447: 1393: 1392: 1361: 1360: 1317: 1316: 1279: 1278: 1238: 1237: 1214: 1213: 1182: 1181: 1178: 1115: 1110: 1053: 1028: 1000:Vigenere cipher 982: 863: 838: 797: 755: 728: 669: 646: 620: 611: 610: 605: 580: 570: 547:High-importance 519:High-importance 502: 499: 496: 493: 492: 460:High‑importance 459: 453: 425: 422: 419: 416: 415: 351: 341: 295: 276: 257: 121: 116: 115: 114: 91: 61: 12: 11: 5: 2459: 2457: 2449: 2448: 2443: 2438: 2433: 2428: 2423: 2418: 2413: 2408: 2403: 2398: 2393: 2388: 2383: 2378: 2373: 2363: 2362: 2349: 2345:are not made. 2333: 2330: 2288: 2285: 2284: 2283: 2255:182.75.188.170 2244: 2241: 2196: 2193: 2192: 2191: 2190: 2189: 2188: 2187: 2186: 2185: 2184: 2183: 2182: 2181: 2180: 2179: 2144: 2143: 2142: 2141: 2140: 2139: 2138: 2137: 2136: 2135: 2134: 2133: 2104: 2103: 2102: 2101: 2100: 2099: 2098: 2097: 2096: 2095: 2070: 2069: 2068: 2067: 2066: 2065: 2064: 2063: 2038: 2037: 2036: 2035: 2034: 2033: 2006: 2005: 2004: 2003: 1984: 1983: 1934: 1931: 1930: 1929: 1928: 1927: 1918: 1853: 1850: 1832: 1828: 1825: 1824: 1823: 1795: 1792: 1791: 1790: 1761: 1760: 1749: 1742: 1737: 1734: 1731: 1728: 1725: 1722: 1719: 1714: 1710: 1695: 1694: 1683: 1676: 1671: 1668: 1665: 1662: 1659: 1656: 1653: 1650: 1647: 1642: 1638: 1623: 1622: 1611: 1604: 1599: 1596: 1593: 1590: 1587: 1584: 1581: 1578: 1575: 1570: 1566: 1550: 1547: 1546: 1545: 1544: 1543: 1542: 1541: 1540: 1539: 1527: 1526: 1525: 1497: 1496: 1495: 1494: 1459: 1458: 1455: 1446: 1443: 1442: 1441: 1407: 1404: 1401: 1380: 1377: 1374: 1371: 1368: 1347: 1344: 1339: 1336: 1330: 1327: 1324: 1304: 1297: 1292: 1289: 1286: 1266: 1259: 1254: 1251: 1248: 1245: 1221: 1201: 1194: 1189: 1177: 1174: 1173: 1172: 1171: 1170: 1153: 1152: 1109: 1106: 1105: 1104: 1103: 1102: 1057:Stream ciphers 1052: 1051:Stream ciphers 1049: 1027: 1021: 1020: 1019: 1016:Jaberwocky6669 1011: 1010: 993:I presume you 987:Jaberwocky6669 981: 978: 977: 976: 975: 974: 973: 972: 971: 970: 969: 968: 967: 966: 965: 964: 963: 962: 961: 960: 862: 859: 858: 857: 837: 834: 818: 817: 796: 793: 792: 791: 790: 789: 762: 761: 754: 751: 727: 724: 723: 722: 721: 720: 719: 718: 668: 665: 619: 616: 613: 612: 606: 603: 568: 566: 559: 558: 555: 554: 551: 550: 537: 527: 526: 515: 509: 508: 506: 489:the discussion 475: 463: 462: 448: 436: 435: 432: 431: 429: 412:the discussion 396: 384: 383: 378: 366: 365: 359: 337: 323: 322: 315: 314: 311: 310: 307: 300: 292: 291: 288: 281: 273: 272: 269: 262: 259:March 29, 2005 254: 253: 250: 247: 243: 242: 234: 233: 226: 218: 217: 193: 181: 180: 118: 117: 113: 112: 107: 102: 93: 92: 90: 89: 82: 77: 68: 62: 60: 59: 48: 39: 38: 35: 34: 28: 13: 10: 9: 6: 4: 3: 2: 2458: 2447: 2444: 2442: 2439: 2437: 2434: 2432: 2429: 2427: 2424: 2422: 2419: 2417: 2414: 2412: 2409: 2407: 2404: 2402: 2399: 2397: 2394: 2392: 2389: 2387: 2384: 2382: 2379: 2377: 2374: 2372: 2369: 2368: 2366: 2359: 2358: 2354: 2353: 2348: 2344: 2340: 2331: 2329: 2327: 2323: 2319: 2315: 2308: 2307: 2304: 2303: 2302: 2294: 2286: 2282: 2279: 2278: 2277: 2268: 2267: 2266: 2264: 2260: 2256: 2252: 2242: 2240: 2238: 2234: 2230: 2226: 2222: 2214: 2213: 2208: 2206: 2201: 2194: 2178: 2174: 2170: 2164: 2158: 2157: 2156: 2155: 2154: 2153: 2152: 2151: 2150: 2149: 2148: 2147: 2146: 2145: 2132: 2128: 2124: 2120: 2116: 2115: 2114: 2113: 2112: 2111: 2110: 2109: 2108: 2107: 2106: 2105: 2094: 2091: 2090: 2089: 2080: 2079: 2078: 2077: 2076: 2075: 2074: 2073: 2072: 2071: 2062: 2058: 2054: 2050: 2046: 2045: 2044: 2043: 2042: 2041: 2040: 2039: 2032: 2028: 2024: 2017: 2012: 2011: 2010: 2009: 2008: 2007: 2002: 1999: 1998: 1997: 1988: 1987: 1986: 1985: 1982: 1978: 1974: 1970: 1966: 1962: 1958: 1957: 1956: 1955: 1951: 1947: 1942: 1938: 1932: 1926: 1923: 1919: 1917: 1914: 1910: 1908: 1906: 1900: 1896: 1895: 1894: 1890: 1886: 1882: 1881: 1875: 1871: 1870: 1869: 1868: 1864: 1860: 1851: 1849: 1848: 1844: 1840: 1835: 1826: 1822: 1819: 1818: 1817: 1811: 1810: 1809: 1808: 1805: 1793: 1789: 1785: 1781: 1777: 1776: 1775: 1774: 1770: 1766: 1747: 1740: 1735: 1732: 1729: 1726: 1720: 1712: 1708: 1700: 1699: 1698: 1681: 1674: 1666: 1663: 1660: 1654: 1648: 1640: 1636: 1628: 1627: 1626: 1609: 1602: 1594: 1591: 1588: 1582: 1576: 1568: 1564: 1556: 1555: 1554: 1548: 1538: 1535: 1528: 1524: 1520: 1519: 1516: 1515: 1514: 1511: 1507: 1503: 1502: 1501: 1500: 1499: 1498: 1493: 1490: 1482: 1481: 1480: 1477: 1473: 1472: 1471: 1470: 1467: 1462: 1456: 1453: 1452: 1451: 1444: 1440: 1437: 1429: 1428: 1427: 1426: 1423: 1405: 1402: 1399: 1378: 1375: 1372: 1369: 1366: 1342: 1337: 1328: 1325: 1322: 1302: 1295: 1290: 1287: 1284: 1264: 1257: 1249: 1246: 1235: 1219: 1199: 1192: 1187: 1175: 1169: 1166: 1161: 1157: 1156: 1155: 1154: 1151: 1148: 1141: 1137: 1136: 1135: 1131: 1127: 1123: 1122:70.104.85.250 1119: 1107: 1101: 1100: 1096: 1094: 1089: 1088: 1087: 1084: 1077: 1076: 1075: 1074: 1071: 1070: 1066: 1064: 1058: 1050: 1048: 1047: 1044: 1037: 1033: 1026: 1022: 1017: 1013: 1012: 1008: 1001: 996: 992: 991: 990: 988: 979: 958: 951: 950: 948: 944: 943: 941: 934: 933: 931: 927: 926: 924: 917: 916: 914: 910: 909: 907: 900: 896: 895: 893: 890:something? -- 888: 887: 885: 877: 873: 872: 871: 869: 861:Fixed example 860: 855: 848: 847: 846: 844: 835: 833: 831: 827: 823: 815: 811: 807: 806: 805: 803: 795:Cryptanalysis 794: 787: 783: 782: 780: 775: 774: 773: 771: 768: 760: 757: 756: 752: 750: 749: 745: 741: 736: 733: 725: 717: 714: 710: 709:Orbis Latinus 706: 705: 703: 699: 698: 696: 695:Robert Merkel 692: 691: 690: 688: 684: 680: 679:137.111.13.33 676: 666: 664: 662: 658: 654: 650: 644: 642: 638: 625: 617: 609: 608:None listed. 601: 598: 595: 592: 589: 586: 583: 579: 577: 567: 565: 564: 548: 545:(assessed as 544: 543: 533: 529: 528: 524: 520: 514: 511: 510: 507: 490: 486: 482: 481: 476: 473: 469: 468: 464: 457: 452: 449: 446: 442: 430: 413: 409: 408: 403: 402: 397: 394: 390: 389: 385: 382: 379: 376: 372: 367: 363: 357: 349: 348: 338: 334: 329: 328: 321: 316: 308: 306: 305: 301: 298: 294: 293: 289: 287: 286: 282: 279: 278:July 19, 2008 275: 274: 270: 268: 267: 263: 260: 256: 255: 251: 248: 245: 244: 239: 235: 231: 227: 224: 220: 219: 215: 211: 207: 206: 201: 197: 196:Caesar cipher 194: 191: 187: 186: 177: 173: 170: 167: 163: 159: 155: 152: 149: 146: 143: 140: 137: 134: 131: 127: 124: 123:Find sources: 120: 119: 111: 110:Verifiability 108: 106: 103: 101: 98: 97: 96: 87: 83: 81: 78: 76: 72: 69: 67: 64: 63: 57: 53: 52:Learn to edit 49: 46: 41: 40: 37: 36: 32: 26: 25:Caesar cipher 22: 18: 17: 2350: 2335: 2312:— Preceding 2309: 2297: 2296: 2290: 2272: 2271: 2249:— Preceding 2246: 2219:— Preceding 2215: 2209: 2202: 2198: 2169:Theblogger01 2118: 2084: 2083: 2023:Theblogger01 1992: 1991: 1946:Theblogger01 1943: 1939: 1936: 1902: 1878: 1873: 1855: 1836: 1830: 1815: 1813: 1797: 1762: 1696: 1624: 1552: 1521: 1505: 1463: 1460: 1448: 1179: 1159: 1111: 1098: 1092: 1068: 1062: 1054: 1031: 1029: 1024: 994: 983: 898: 875: 864: 839: 819: 809: 798: 763: 758: 743: 738:(If, as the 737: 729: 673:— Preceding 670: 645: 641:Potatocircle 621: 607: 596: 590: 584: 574: 540: 518: 494:Cryptography 485:Cryptography 478: 451:Cryptography 405: 399: 362:WikiProjects 345: 319: 302: 297:June 4, 2023 283: 264: 214:please do so 203: 195: 171: 165: 157: 150: 144: 138: 132: 122: 94: 19:This is the 2332:FA concerns 1422:81.62.90.36 1116:—Preceding 633:2 July 2019 629:28 May 2019 148:free images 31:not a forum 2365:Categories 2200:resource. 1418:0}" /: --> 1391:(assuming 899:decrypting 713:Tinctorius 205:identified 2021:deletion? 1922:Sebastian 1913:Sebastian 1839:Shiningfm 1765:diego_pmc 1234:remainder 1160:effective 753:Inventor? 667:Key space 350:is rated 88:if needed 71:Be polite 21:talk page 2347:Hog Farm 2314:unsigned 2251:unsigned 2233:contribs 2221:unsigned 1969:Wcherowi 1466:Jhohorst 1395:0}": --> 1130:contribs 1118:unsigned 947:Ciaran H 930:Ciaran H 913:Ciaran H 892:Ciaran H 868:Ciaran H 836:Good job 802:Lunkwill 675:unsigned 653:PrimeBOT 352:FA-class 271:Promoted 56:get help 29:This is 27:article. 2343:WP:FACR 2300:Hut 8.5 2275:Hut 8.5 2087:Hut 8.5 2016:Hut 8.5 1995:Hut 8.5 1905:Wwwwolf 1880:wwwwolf 1852:Infobox 1816:Hut 8.5 1801:— Matt 1531:— Matt 1506:decrypt 1486:— Matt 1433:— Matt 1144:— Matt 1080:— Matt 1060:it up. 1040:— Matt 1004:— Matt 954:— Matt 937:— Matt 920:— Matt 903:— Matt 881:— Matt 851:— Matt 702:Marcika 521:on the 249:Process 154:WP refs 142:scholar 1889:growls 1803:Crypto 1533:Crypto 1488:Crypto 1435:Crypto 1146:Crypto 1082:Crypto 1042:Crypto 1006:Crypto 995:aren't 956:Crypto 939:Crypto 922:Crypto 905:Crypto 883:Crypto 853:Crypto 830:— Matt 814:— Matt 786:— Matt 770:— Matt 407:spoken 358:scale. 252:Result 126:Google 2310:ole 2121:"? - 1885:barks 1872:Huh. 1831:Hi :) 1827:Group 1780:Zsero 1510:Zsero 1476:Zsero 1403:: --> 1212:when 1140:ROT13 1095:roken 1065:roken 576:To-do 339:This 198:is a 169:JSTOR 130:books 84:Seek 2352:Talk 2322:talk 2259:talk 2229:talk 2225:Xarg 2173:talk 2163:DVdm 2127:talk 2123:DVdm 2057:talk 2053:DVdm 2027:talk 1977:talk 1973:DVdm 1950:talk 1903:But 1899:here 1863:talk 1843:talk 1784:talk 1769:talk 1376:< 1359:and 1126:talk 843:Deco 744:this 683:talk 657:talk 631:and 513:High 309:Kept 290:Kept 246:Date 162:FENS 136:news 73:and 1748:27. 1741:mod 1682:26. 1675:mod 1610:31. 1603:mod 1338:mod 1296:mod 1258:mod 1236:of 1193:mod 824:or 748:FOo 651:by 176:TWL 2367:: 2324:) 2261:) 2235:) 2231:• 2175:) 2129:) 2059:) 2029:) 1979:) 1952:) 1911:◄ 1891:) 1865:) 1845:) 1786:) 1771:) 1733:− 1664:− 1592:− 1412:0} 1370:≤ 1326:≡ 1247:− 1165:ww 1132:) 1128:• 1038:. 779:ww 685:) 659:) 643:. 549:). 454:: 156:) 54:; 2320:( 2257:( 2227:( 2171:( 2165:: 2161:@ 2125:( 2055:( 2025:( 2018:: 2014:@ 1975:( 1948:( 1887:/ 1883:( 1861:( 1841:( 1782:( 1767:( 1736:n 1730:x 1727:= 1724:) 1721:x 1718:( 1713:n 1709:D 1670:) 1667:n 1661:x 1658:( 1655:= 1652:) 1649:x 1646:( 1641:n 1637:D 1598:) 1595:n 1589:x 1586:( 1583:= 1580:) 1577:x 1574:( 1569:n 1565:D 1406:0 1400:n 1379:n 1373:y 1367:0 1346:) 1343:n 1335:( 1329:x 1323:y 1303:n 1291:x 1288:= 1285:y 1265:5 1253:) 1250:2 1244:( 1220:x 1200:n 1188:x 1124:( 1099:S 1093:B 1069:S 1063:B 681:( 655:( 600:R 597:· 594:W 591:· 588:H 585:· 582:E 578:: 525:. 364:: 216:. 172:· 166:· 158:· 151:· 145:· 139:· 133:· 128:( 58:.

Index

talk page
Caesar cipher
not a forum
Click here to start a new topic.
Learn to edit
get help
Assume good faith
Be polite
avoid personal attacks
Be welcoming to newcomers
dispute resolution
Neutral point of view
No original research
Verifiability
Google
books
news
scholar
free images
WP refs
FENS
JSTOR
TWL
Featured article
featured article
identified
Knowledge (XXG) community
please do so
Main Page trophy
Today's featured article

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.