1877:
probably should have filled in more fields back in the day when I had time, but I expected the fields to be filled in due time in the generally accepted spirit of eventualism. Also, the infoboxes generally help the articles inside the subject matters. Though, I admit I did pick the just about only infobox template that I could find at the time, and that particular one was best geared for modern ciphers. Are there better suited infoboxes for ancient ciphers before the modern distinctions and classifications? Please advise, this article (like articles of other old ciphers) looks quite bleak without an appropriate infobox. --
2295:. I don't think these add anything meaningful to the article. The algorithm for the Caesar cipher is so simple it can be encapsulated in one simple formula, as in the "Example" section. Any well-written code example will also only have one line devoted to the actual enciphering, which is the same as the formula given earlier. Most of the code is invariably devoted to iterating through the input string, converting the string characters into numbers, and assembling the output, instead of implementing the actual cipher itself. As a result the reader doesn't gain anything from reading the example.
342:
777:
powerful and famous (just consider authorship credits on papers written by graduate students, no), and this pollutes the attribution space with lots of squirrely data. JC would seem to have been an enthusiastic user in a military context and a powerful and famous guy generally, so things may have stuck. That we no longer have that Roman book on crypto is unfortunate for this. If we simply say that single alph sub cypher wasn't his, we would certainly be safe.
190:
333:
223:
571:
624:
532:
393:
472:
445:
375:
1876:
It's been over a year since you left the comment! As the person who added the infobox in question in the first place (I think, my memory is hazy), I guess I should comment, as is the norm in case of the absurdities of
Knowledge (XXG). Anyway: I do agree that there weren't many fields filled in, and I
1798:
Kudos to Hut8.5 for his cleanup and tracking down some sources for this article. I'm a bit worried, though, by the Daily Mail cite -- the newspaper is not a particularly scholarly source. I wouldn't at all be surprised, for example, if the Daily Mail had used
Knowledge (XXG) as a source itself (given
1430:
OK, good point. Perhaps, then, we should go the route of explicitly defining "mod" as you suggest, in the interests of keeping the encryption and decryption formulae simple. The alternative is to add 26 to the formula to ensure it's positive, but that might be less clear to the reader. As it's really
878:
without checking. Do the other ones work? You are most definitely allowed to change even featured articles, and especially if they've got (cough) mistakes in them ;-) While checking, I also noticed that "AFCCP" could also become "diffs" (which isn't a dictionary word, of course, but it's a common bit
799:
The
History section relates cryptanalysis of the caesar cipher and frequency analysis. That's the nice way to do it, but since brute force is so trivial and obvious for this cipher, can we really even talk about "methods of breaking the cipher" being unavailable? I mean, it's a *Caesar cipher*. :)
1989:
I disagree with the removal. Including neutral encyclopedic coverage of an organised crime figure in a location where that content is relevant is not in any sense promotional. The article does not imply that
Provenzano is a historical figure with comparable stature to Caesar, just that both of these
1856:
I have just removed the infobox from this page. It has been around since 2007 and I am surprised that no one has complained about it. It's use for modern encryption schemes is fine, the template was designed for that. In this instance however, too few fields are filled in and the result looks like a
1517:
Heh, yes, I got muddled — early morning editing is never a strong point for me. But I do think it's ambiguous, and certainly all the books (I've read) on the history of cryptography read it being a right shift. They may well all be mistaken, but I think our best option is to just omit specifying the
1059:
category. Does it really qualify? Beacuse it doesn't do what is described on the stream cipher's article "the transformation of successive digits varies during the encryption." I think I could argue it either way (it's just a really simple stream cipher), but I thought someone should at least bring
865:
One of the examples in the article stated that "AFCCQ" would rotate to either "jolly" or "cheer". It doesn't; it rotates to "jollz" and "chees". I fixed the example to read "AFCCP" instead. This is my first edit of a featured article in particular, so I hope I wasn't meant to go through any sort of
776:
Matt, The timeline in progress notes earlier uses of single alphabet substitution cyphers (eg, Atbash) and I think I remember that the
Egyptian carving thing from thousands of years earlier was such a thing (but don't count on it). The problem would seem to be that many things get attributed to the
2269:
I've removed this as I don't think it adds anything to the article. Knowledge (XXG) isn't a source code repository, code is only included if it significantly enhances the reader's understanding of the topic. The Caesar cipher is so simple that even small children can easily grasp the algorithm, it
1522:
extant et ad
Ciceronem, item ad familiares domesticis de rebus, in quibus, si qua occultius perferenda erant, per notas scripsit, id est sic structo litterarum ordine, ut nullum verbum effici posset: quae si qui investigare et persequi velit, quartam elementorum litteram, id est D pro A et perinde
1034:
this month, where they had a feature on websites about codes and ciphers. Apparently, "they select a topic, in this case Codes and
Ciphers, and present websites that they believe will be helpful to students and teachers. Each one has a short summary/review". The review for this article was, "This
889:
Ha! I love it when I find mistakes in published books. :P As far as I can see, the others are fine, although I wonder at the "attackatonce" example table, as the shifts are in reverse order. From "exxegoexsrgi", the text "attackatonce" would technically be a shift of 22, not 4. Or am I misreading
734:
are not the same kind of puzzle at all. A cryptic crossword is a crossword with particular styles of clues. It does not involve any encryption. A cryptogram is a piece of text which has been encrypted with a simple substitution cipher (each letter replaced throughout with some other letter). It's
2199:
Quite some time ago, I created a Caesar cipher decryption tool, based on a frequency heuristic, where you can paste some text and the right key is guessed. The tool is the most linked and most frequently visited page of my blog, which might be a slight indicator, that people see in it a valuable
1483:
Yeah, it seems ambiguous, depending on what "substitute for" means. To my mind, if you substitute D for A, it could well mean that you replace A with D. This is the interpretation taken by Kahn and others. I wonder if the original language is clearer? I think we're safer just describing Caesar's
997:
talking about the Caesar cipher as described in this article, because the article goes into quite some detail about how to break those...perhaps you mean a shift cipher where the shift can vary with each letter, as opposed to being fixed? If the shift varies according to a repeating keyword, the
1833:
I'd like to add something about the last sentence of the article "In mathematical terms, the encryption under various keys forms a group." I think that it should be reformulated. Actually, saying that the encryption forms a group means nothing to me. It would be better to write that the set of
1162:
cryptography since ca 1000CE when the Arabs discovered frequency analysis. This ineffectiveness (ie, complete fecklessness) is so, even if a particular
Opponent is a tad slow and hasn't heard of frequency analysis. As is often quipped, it "may be good enough for keeping your kid sister out" of
2216:
However, as I wrote, I don't think this is an advertising other than bringing in a valuable reference to
Knowledge (XXG) and so I would be glad if you add the link permanently if the resource meeds your quality demands. I assure that this link will be available and that I own the site.
636:
2081:
I've reverted the edit. The point made by the source isn't that the cipher was executed imperfectly, it's that the cipher itself is extremely insecure (which explains why there are so few modern examples). If you'd like to rephrase it to emphasise that then I could go along with it.
1449:
I'm not a cryptographer but my reading of
Suetonius is that Julius Ceasar's code was a shift of -3, or three to the left. The examples given, while not specifically being noted as having Caesar's shift do have a shift of three, but three to the right. For example, in the example:
2020:
It would make more sense to see more positive modern uses of this cipher rather than the examples given. So it is not really neutral and according to the source it is more anecdotal than encyclopedic. However, would you both agree to an edit of the sentence rather than a
1940:
In April 2006, fugitive Mafia boss Bernardo Provenzano was captured in Sicily partly because some of his messages, written in a variation of the Caesar cipher, were broken. Provenzano's cipher used numbers, so that "A" would be written as "4", "B" as "5", and so on.
984:
Where could I find an advanced caesar Cipher breaker? I need it to figure out strings such as delta=-?,+?,-?,+?,-?,+?,... and possibly do it backwards for me too. I have no idea where to even begin to break a cipher in which the delta is unknown!!!
1112:
Could someone write about the cipher's relevance today? When learning cryptographic methods, one inevitably is told of the Caesar Cipher. Perhaps someone should write about how it's used as a building block on developing more complex methods...
764:
I've had a quick thumb through Kahn (and the Internet), but I can't find any reference to shift ciphers before Caesar; I don't think we can say "certainly not invented by him", or can we? An NSA page (admittedly for kids) attributes it to him:
2336:
This older featured article contains a proportionately significant amount of uncited text, and the history section is largely a list of events that aren't connected well. Modern FAs have higher expectations for sourcing and structure, and a
840:
I just wanted to congratulate the authors of this article. Although a very simple topic, they've really done a great job of explaining it while using it as a demonstration of simple cryptography and cryptanalysis. I'm impressed.
2051:. We could also replace "badly" with "clumsily", as that term appears in the title of the article, but I think "badly" pretty well covers the tone and the content of the source. Good job, and welcome to collaborative editing! -
153:
2380:
1963:, as you said. I don't think it popularises the group. In my opinion it is a short, neutral, properly sourced, and sufficiently relevant example of the article subject. After all, we also have an article on
522:
2375:
1857:
malformed infobox. If you feel that for uniformity there should be an infobox on this page, then don't use the template, just build one as a table so that it can be customized for this cipher.
303:
284:
2405:
2270:
doesn't need code to explain it. Most of the code which was added related to the practicalities of handling different types of string characters rather than the actual algorithm itself.
1464:
This implies to me that to read the encoded text you would substitute the letter D whenever the letter A is encountered in the cipher. The example above the result would be an X for A.
1692:
1620:
1758:
1357:
265:
204:
229:
1389:
901:
the ciphertext with it — a decryption is a shift in the opposite direction to encryption (left shift). I've changed the heading of the table, hopefully it makes it clearer?
2430:
1275:
546:
2395:
1504:"To my mind, if you substitute D for A, it could well mean that you replace A with D." Yes, that is exactly what it means. But note that Seutonius is describing how to
1313:
1508:
the message, not how to encrypt it. Therefore the cipher is a left shift. It's not ambiguous at all. Unless the translation is wrong, but why would we suspect that?
1210:
147:
411:
1907:
touches on a point: Infoboxes also serve a purpose for classification and distinction. That's something that could be improved in this article, as I will write below.
2435:
2420:
2410:
1230:
512:
346:
79:
1417:
2445:
2390:
2425:
400:
380:
2440:
2247:
Hey there i have implemented the algorithm in python, perhaps it will help the programmers to understand how it works. Please feel free to comment here
1461:
From Suetonius: "If anyone wishes to decipher these ... he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others."
488:
1035:
Knowledge (XXG) article shows you how the Caesar Cipher works, and how to break it! It also explains some of the history of how Julius Caesar used it"
897:
It depends which way you're looking at it: if you're viewing it as a brute force attack, you're trying each possible encryption key (right shift), and
707:
For Caesar, the keyspace was even smaller: {0, 1, 2, ..., 23}, where 0 and 23 are identical and 'do nothing' (as pointed out by Marcika). According to
648:
541:
455:
2400:
85:
2415:
1920:
Striking my last two sentences, because I don't want to jump to the conclusion that just because I overlooked something it wasn't clear enough. ◄
2370:
2317:
44:
935:
I've tried central alignment, which (personally) I think looks slightly better in the wide column, but I don't really mind much either way.
479:
450:
2254:
30:
812:". Perhaps here, though, it was assumed that "the enemy doesn't know the system", in which case frequency analysis would be very useful.
1129:
1090:
I added the Vigenere cipher to the category though, I think that is proper (I'd say Vigenere is the most simple of the stream ciphers).
678:
99:
1078:
I've removed the category; it's not really a stream cipher, not in how people would normally understand and use the term, at least.
104:
20:
1897:
In my eyes, the article doesn't look bleak as it is. If anything, the removal of the 4 apparently unmotivated lines (as last seen
2385:
911:
It makes sense now, yes, but now it seems that the column is too wide. Would just "Decryption shift" or "Reverse shift" work? --
74:
1944:
This is because it doesn't really add to the article and popularises a modern crime figure compared with a historical leader.
1036:
355:
1799:
that this article was featured on Knowledge (XXG)'s main page a couple of weeks before the newspaper article was published).
1277:
can be either -2 or 3. Which of this two values is used depends widely on the context, where the operator is used. In crypto
199:
168:
65:
1888:
135:
742:
page suggests, those are called "cryptograms" in Dutch, that might be part of the confusion. The intended reference in
1990:
people made use of the cipher. I also don't see how someone could think that it "doesn't really add to the article".
222:
2232:
1518:
direction of the shift of the historical cipher in the article. For reference, the original Latin was apparently:
109:
693:
The set {1, 2, ... 26}, being all the possible offsets. Not much of a challenge, even for a human computer! --
2321:
2258:
332:
189:
129:
1837:
Finally, i'd like to say that i'm french so maybe I misunderstood the sentence ! Sorry if this is the case. --
361:
209:
1631:
1559:
1125:
682:
2313:
2250:
2220:
1703:
1117:
674:
575:
2172:
2026:
1949:
125:
1842:
1318:
55:
1121:
1097:
1067:
487:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
410:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
810:
furthermore, there is no record that any method was then known which would reliably break such a cipher
70:
1421:
2203:
As Knowledge (XXG) is a collection of valuable resources and information, I proposed to add the tool
1812:
I didn't realise that. Feel free to remove it - it was the only one I could find for that statement.
708:
175:
1014:
You understood puuurrfectleee... thanks! I am trying to solve an internet riddle thingie lol...
213:
1964:
1768:
1465:
1015:
986:
825:
820:
Hmm..yeah, having thought about it, perhaps this cryptanalysis section would be better merged into
161:
2291:
This article often gets implementations of the cipher in common programming languages added, e.g.
928:
Sounds good. I also right-aligned the numbers so that it looks better. Are you happy with this? --
759:
Others are known to have used such ciphers before Caesar, so it was certainly not invented by him.
2351:
1921:
1912:
1862:
1362:
821:
747:
694:
656:
627:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
2224:
1239:
2168:
2022:
1945:
1884:
1280:
1158:
I'd rephrase that a bit. The Caesar cypher and all its relatives before and after hasn't been
739:
731:
640:
51:
2342:
1163:
things, but not for much else. Newspaper puzzles maybe; at least the less challangeing sort.
1800:
1530:
1485:
1432:
1183:
1143:
1091:
1079:
1061:
1039:
1003:
953:
936:
919:
902:
880:
850:
829:
813:
785:
769:
2338:
141:
1783:
999:
712:
1180:
There have been a couple of incorrect reverts. There is no generally used definition of
2228:
2126:
2056:
1976:
1838:
1764:
1056:
1215:
2364:
2346:
1968:
1909:
1858:
946:
929:
912:
891:
867:
842:
801:
711:, the alphabet didn't contain more than 23 characters after the first century B.C. --
652:
24:
1394:
945:
Centre alignment works too. ;) Would it be worth centering the plaintext as well? --
2298:
2273:
2085:
2015:
1993:
1904:
1879:
1814:
701:
484:
766:
700:
Actually, it is only the set {1 ... 25} - ROT26 not being much of a cipher :) -
623:
2210:
Unfortunately, the change was reverted automatically as I got explained here:
1779:
1509:
1475:
2204:
2162:
2122:
2052:
1972:
1233:
531:
1763:
All these are featured articles. So, which formula is correct in the end?
735:
meant to be solved by frequency analysis and recognizing letter patterns.
1420:). To be correct the article should clearly state the definition of mod.
1164:
778:
471:
444:
392:
374:
2356:
2325:
2305:
2280:
2262:
2236:
2176:
2130:
2092:
2060:
2030:
2000:
1980:
1953:
1924:
1915:
1892:
1866:
1846:
1834:
ciphers, with the law of composition for applications, forms a group.
1820:
1806:
1787:
1772:
1536:
1512:
1491:
1484:
cipher with a shift of three, rather than specifying which direction.
1478:
1468:
1438:
1424:
1167:
1149:
1085:
1072:
1045:
715:
686:
660:
404:, a collaborative effort to improve the coverage of articles that are
406:
866:
process for it; something I only thought about after I'd done so. --
1139:
2211:
1778:
They're all right. It depends on the alphabet, of course. --
918:
I've changed it to "Decryption shift", which is a bit smaller.
2047:
I noticed that you made a slight change, by adding the phrase
874:
Thanks for spotting this! I copied it mindlessly from Bauer's
562:
326:
15:
530:
2381:
Featured articles that have appeared on the main page once
746:
article is to what is called a cryptogram in English.) --
1431:
just a technicality, we could even do it in a footnote.
228:
This article appeared on Knowledge (XXG)'s Main Page as
2292:
2048:
1960:
1898:
599:
593:
587:
581:
296:
277:
258:
1002:. Have I understood correctly what you're describing?
160:
2376:
Featured articles that have appeared on the main page
1706:
1634:
1562:
1398:
1365:
1321:
1283:
1242:
1218:
1186:
618:
Wiki Education Foundation-supported course assignment
2406:
Knowledge (XXG) level-5 vital articles in Technology
2119:
clumsily written in a variation of the Caesar cipher
483:, a collaborative effort to improve the coverage of
174:
1752:
1686:
1614:
1410:
1383:
1351:
1307:
1269:
1224:
1204:
420:Knowledge (XXG):WikiProject Spoken Knowledge (XXG)
1961:"because it popularises an organised crime group"
1030:This article got recommended in an a feature in
33:for general discussion of the article's subject.
1967:. So I have restored the content, as did user
784:I've added a (somewhat cautious) replacement.
767:http://www.nsa.gov/kids/ciphers/ciphe00002.htm
1142:, but that's not really cryptography per se.
879:of jargon on Knowledge (XXG) and elsewhere).
8:
2396:Knowledge (XXG) vital articles in Technology
730:A cryptogram (in the English meaning) and a
212:. Even so, if you can update or improve it,
208:as one of the best articles produced by the
202:; it (or a previous version of it) has been
423:Template:WikiProject Spoken Knowledge (XXG)
2311:
2248:
2218:
672:
439:
369:
237:
184:
2431:High-importance Computer science articles
2341:may be necessary if improvements towards
2205:https://www.xarg.org/tools/caesar-cipher/
1711:
1705:
1639:
1633:
1567:
1561:
1397:
1364:
1331:
1320:
1282:
1241:
1217:
1185:
649:Template:Dashboard.wikiedu.org assignment
2117:Yes, fair enough. Perhaps we could say "
1687:{\displaystyle D_{n}(x)=(x-n)\mod {26}.}
1615:{\displaystyle D_{n}(x)=(x-n)\mod {31}.}
497:Knowledge (XXG):WikiProject Cryptography
330:
2212:https://en.wikipedia.org/User_talk:Xarg
1745:
1743:
1679:
1677:
1607:
1605:
1300:
1298:
1262:
1260:
1197:
1195:
808:Sure ;) I presume you're referring to "
647:Above undated message substituted from
441:
371:
2446:Knowledge (XXG) pages with to-do lists
2391:Knowledge (XXG) level-5 vital articles
1971:. What do other contributors think? -
1753:{\displaystyle D_{n}(x)=x-n\mod {27}.}
2436:WikiProject Computer science articles
2421:High-importance Cryptography articles
2411:FA-Class vital articles in Technology
7:
1529:(Not that I can read a word of it).
1352:{\displaystyle y\equiv x{\pmod {n}}}
671:What is key space in caesar cipher?
477:This article is within the scope of
398:This article is within the scope of
2243:Implemented the algorithm in python
1457:Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC
1454:Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
360:It is of interest to the following
23:for discussing improvements to the
2426:FA-Class Computer science articles
1937:I would like to remove this line:
632:
628:
401:WikiProject Spoken Knowledge (XXG)
14:
2441:WikiProject Cryptography articles
2371:Knowledge (XXG) featured articles
1340:
500:Template:WikiProject Cryptography
50:New to Knowledge (XXG)? Welcome!
2207:for the external pages section.
1959:Yes, you removed it a few times
1176:mod operator is not well defined
1138:Well, it's not, really. There's
828:; most of it is pretty general.
635:. Further details are available
622:
569:
470:
443:
391:
373:
340:
331:
221:
188:
45:Click here to start a new topic.
2401:FA-Class level-5 vital articles
1553:In the Romanian article it is:
849:Thanks for your kind comments!
517:This article has been rated as
426:Spoken Knowledge (XXG) articles
2416:FA-Class Cryptography articles
1847:01:20, 29 September 2008 (UTC)
1723:
1717:
1697:And in the Spanish one it is:
1669:
1657:
1651:
1645:
1625:In the English article it is:
1597:
1585:
1579:
1573:
1345:
1334:
1252:
1243:
1:
2357:13:54, 1 September 2022 (UTC)
2326:01:06, 18 November 2021 (UTC)
1738:
1672:
1600:
1439:09:33, 12 December 2006 (UTC)
1425:09:21, 12 December 2006 (UTC)
1332:
1315:is usually defined such that
1293:
1255:
1190:
1086:15:47, 22 November 2005 (UTC)
1073:22:52, 21 November 2005 (UTC)
1046:18:25, 1 September 2005 (UTC)
716:20:48, 26 February 2006 (UTC)
539:This article is supported by
491:and see a list of open tasks.
414:and see a list of open tasks.
42:Put new text under old text.
1901:) took away some bleakness.
1893:02:32, 21 October 2016 (UTC)
1867:04:00, 13 October 2015 (UTC)
1549:Correct mathematical formula
1384:{\displaystyle 0\leq y<n}
661:16:31, 16 January 2022 (UTC)
542:WikiProject Computer science
998:scheme is usually called a
2462:
2306:15:38, 26 April 2020 (UTC)
1925:12:00, 24 April 2018 (UTC)
1916:11:39, 24 April 2018 (UTC)
1788:18:48, 28 March 2008 (UTC)
1773:17:26, 28 March 2008 (UTC)
1270:{\displaystyle (-2)\mod 5}
989:05:06, Jun 21, 2005 (UTC)
949:16:05, Apr 12, 2005 (UTC)
932:15:59, Apr 12, 2005 (UTC)
915:15:48, Apr 12, 2005 (UTC)
894:15:32, Apr 12, 2005 (UTC)
870:15:14, Apr 12, 2005 (UTC)
687:06:48, 29 April 2003 (UTC)
266:Featured article candidate
2237:03:15, 21 July 2018 (UTC)
2177:15:11, 8 April 2016 (UTC)
2159:That's a good compromise
2131:06:55, 8 April 2016 (UTC)
2093:06:49, 8 April 2016 (UTC)
2061:06:42, 8 April 2016 (UTC)
2031:22:20, 7 April 2016 (UTC)
2001:21:19, 7 April 2016 (UTC)
1981:20:51, 7 April 2016 (UTC)
1954:20:40, 7 April 2016 (UTC)
1821:18:36, 16 June 2008 (UTC)
1807:18:14, 16 June 2008 (UTC)
1537:06:31, 17 July 2007 (UTC)
1513:05:30, 17 July 2007 (UTC)
1492:05:23, 17 July 2007 (UTC)
1479:03:33, 17 July 2007 (UTC)
1469:02:54, 17 July 2007 (UTC)
1308:{\displaystyle y=x\mod n}
1168:13:28, 18 June 2006 (UTC)
1150:07:43, 18 June 2006 (UTC)
1018:18:46, Jun 22, 2005 (UTC)
942:16:04, 12 Apr 2005 (UTC)
925:15:55, 12 Apr 2005 (UTC)
908:15:43, 12 Apr 2005 (UTC)
886:15:23, 12 Apr 2005 (UTC)
845:03:24, 12 Apr 2005 (UTC)
832:00:45, 24 Nov 2004 (UTC)
704:02:18, 12 Apr 2005 (UTC)
538:
516:
465:
386:
368:
317:
240:
236:
210:Knowledge (XXG) community
80:Be welcoming to newcomers
2281:20:56, 4 July 2019 (UTC)
2263:14:06, 4 July 2019 (UTC)
2049:"badly executed version"
1009:13:57, 21 Jun 2005 (UTC)
959:16:09, 12 Apr 2005 (UTC)
856:12:02, 12 Apr 2005 (UTC)
804:21:21, 2 Aug 2004 (UTC)
781:16:27, 2 Aug 2004 (UTC)
772:04:57, 2 Aug 2004 (UTC)
697:23:49 29 Jun 2003 (UTC)
480:WikiProject Cryptography
230:Today's featured article
2386:FA-Class vital articles
2339:featured article review
2293:this JavaScript example
1232:is negative. E.g., the
1205:{\displaystyle x\mod n}
1055:This article is in the
1023:Article recommended in
816:00:49, 3 Aug 2004 (UTC)
788:00:58, 3 Aug 2004 (UTC)
304:Featured article review
285:Featured article review
1754:
1688:
1616:
1413:
1385:
1353:
1309:
1271:
1226:
1206:
1032:School Library Journal
1025:School Library Journal
952:Might as well - done.
535:
417:Spoken Knowledge (XXG)
381:Spoken Knowledge (XXG)
75:avoid personal attacks
1755:
1689:
1617:
1474:Good point - fixed.
1414:
1411:{\displaystyle n: -->
1386:
1354:
1310:
1272:
1227:
1207:
639:. Student editor(s):
534:
503:Cryptography articles
354:on Knowledge (XXG)'s
347:level-5 vital article
100:Neutral point of view
1704:
1632:
1560:
1396:
1363:
1319:
1281:
1240:
1216:
1184:
105:No original research
2287:Programming samples
2167:. I'll put that in.
1965:Bernardo Provenzano
1933:Removal of Sentence
1445:Misleading Example?
826:substitution cipher
1874:(checks the clock)
1750:
1746:
1744:
1739:
1684:
1680:
1678:
1673:
1612:
1608:
1606:
1601:
1523:reliquas commutet.
1408:
1381:
1349:
1341:
1333:
1305:
1301:
1299:
1294:
1267:
1263:
1261:
1256:
1222:
1202:
1198:
1196:
1191:
1108:Relevance Today...
822:frequency analysis
637:on the course page
604:Updated 2011-04-30
536:
356:content assessment
241:Article milestones
232:on April 12, 2005.
86:dispute resolution
47:
2328:
2316:comment added by
2265:
2253:comment added by
2239:
2223:comment added by
1804:
1794:Daily Mail source
1534:
1489:
1436:
1225:{\displaystyle x}
1147:
1134:
1120:comment added by
1083:
1043:
1007:
957:
940:
923:
906:
884:
876:Decrypted Secrets
854:
740:cryptic crossword
732:cryptic crossword
726:Explaining revert
689:
677:comment added by
615:
614:
561:
560:
557:
556:
553:
552:
438:
437:
434:
433:
325:
324:
313:
312:
183:
182:
66:Assume good faith
43:
2453:
2301:
2276:
2166:
2088:
2019:
1996:
1859:Bill Cherowitzo
1802:
1759:
1757:
1756:
1751:
1716:
1715:
1693:
1691:
1690:
1685:
1644:
1643:
1621:
1619:
1618:
1613:
1572:
1571:
1532:
1487:
1434:
1419:
1416:
1415:
1409:
1390:
1388:
1387:
1382:
1358:
1356:
1355:
1350:
1348:
1314:
1312:
1311:
1306:
1276:
1274:
1273:
1268:
1231:
1229:
1228:
1223:
1211:
1209:
1208:
1203:
1145:
1133:
1114:
1081:
1041:
1005:
980:Advanced Breaker
955:
938:
921:
904:
882:
852:
663:
634:
630:
626:
602:
573:
572:
563:
523:importance scale
505:
504:
501:
498:
495:
474:
467:
466:
461:
458:
456:Computer science
447:
440:
428:
427:
424:
421:
418:
395:
388:
387:
377:
370:
353:
344:
343:
336:
335:
327:
320:Featured article
318:Current status:
299:
280:
261:
238:
225:
200:featured article
192:
185:
179:
178:
164:
95:Article policies
16:
2461:
2460:
2456:
2455:
2454:
2452:
2451:
2450:
2361:
2360:
2355:
2334:
2318:209.216.186.111
2299:
2289:
2274:
2245:
2197:
2195:Decryption Tool
2160:
2086:
2013:
1994:
1935:
1854:
1829:
1796:
1707:
1702:
1701:
1635:
1630:
1629:
1563:
1558:
1557:
1551:
1447:
1393:
1392:
1361:
1360:
1317:
1316:
1279:
1278:
1238:
1237:
1214:
1213:
1182:
1181:
1178:
1115:
1110:
1053:
1028:
1000:Vigenere cipher
982:
863:
838:
797:
755:
728:
669:
646:
620:
611:
610:
605:
580:
570:
547:High-importance
519:High-importance
502:
499:
496:
493:
492:
460:High‑importance
459:
453:
425:
422:
419:
416:
415:
351:
341:
295:
276:
257:
121:
116:
115:
114:
91:
61:
12:
11:
5:
2459:
2457:
2449:
2448:
2443:
2438:
2433:
2428:
2423:
2418:
2413:
2408:
2403:
2398:
2393:
2388:
2383:
2378:
2373:
2363:
2362:
2349:
2345:are not made.
2333:
2330:
2288:
2285:
2284:
2283:
2255:182.75.188.170
2244:
2241:
2196:
2193:
2192:
2191:
2190:
2189:
2188:
2187:
2186:
2185:
2184:
2183:
2182:
2181:
2180:
2179:
2144:
2143:
2142:
2141:
2140:
2139:
2138:
2137:
2136:
2135:
2134:
2133:
2104:
2103:
2102:
2101:
2100:
2099:
2098:
2097:
2096:
2095:
2070:
2069:
2068:
2067:
2066:
2065:
2064:
2063:
2038:
2037:
2036:
2035:
2034:
2033:
2006:
2005:
2004:
2003:
1984:
1983:
1934:
1931:
1930:
1929:
1928:
1927:
1918:
1853:
1850:
1832:
1828:
1825:
1824:
1823:
1795:
1792:
1791:
1790:
1761:
1760:
1749:
1742:
1737:
1734:
1731:
1728:
1725:
1722:
1719:
1714:
1710:
1695:
1694:
1683:
1676:
1671:
1668:
1665:
1662:
1659:
1656:
1653:
1650:
1647:
1642:
1638:
1623:
1622:
1611:
1604:
1599:
1596:
1593:
1590:
1587:
1584:
1581:
1578:
1575:
1570:
1566:
1550:
1547:
1546:
1545:
1544:
1543:
1542:
1541:
1540:
1539:
1527:
1526:
1525:
1497:
1496:
1495:
1494:
1459:
1458:
1455:
1446:
1443:
1442:
1441:
1407:
1404:
1401:
1380:
1377:
1374:
1371:
1368:
1347:
1344:
1339:
1336:
1330:
1327:
1324:
1304:
1297:
1292:
1289:
1286:
1266:
1259:
1254:
1251:
1248:
1245:
1221:
1201:
1194:
1189:
1177:
1174:
1173:
1172:
1171:
1170:
1153:
1152:
1109:
1106:
1105:
1104:
1103:
1102:
1057:Stream ciphers
1052:
1051:Stream ciphers
1049:
1027:
1021:
1020:
1019:
1016:Jaberwocky6669
1011:
1010:
993:I presume you
987:Jaberwocky6669
981:
978:
977:
976:
975:
974:
973:
972:
971:
970:
969:
968:
967:
966:
965:
964:
963:
962:
961:
960:
862:
859:
858:
857:
837:
834:
818:
817:
796:
793:
792:
791:
790:
789:
762:
761:
754:
751:
727:
724:
723:
722:
721:
720:
719:
718:
668:
665:
619:
616:
613:
612:
606:
603:
568:
566:
559:
558:
555:
554:
551:
550:
537:
527:
526:
515:
509:
508:
506:
489:the discussion
475:
463:
462:
448:
436:
435:
432:
431:
429:
412:the discussion
396:
384:
383:
378:
366:
365:
359:
337:
323:
322:
315:
314:
311:
310:
307:
300:
292:
291:
288:
281:
273:
272:
269:
262:
259:March 29, 2005
254:
253:
250:
247:
243:
242:
234:
233:
226:
218:
217:
193:
181:
180:
118:
117:
113:
112:
107:
102:
93:
92:
90:
89:
82:
77:
68:
62:
60:
59:
48:
39:
38:
35:
34:
28:
13:
10:
9:
6:
4:
3:
2:
2458:
2447:
2444:
2442:
2439:
2437:
2434:
2432:
2429:
2427:
2424:
2422:
2419:
2417:
2414:
2412:
2409:
2407:
2404:
2402:
2399:
2397:
2394:
2392:
2389:
2387:
2384:
2382:
2379:
2377:
2374:
2372:
2369:
2368:
2366:
2359:
2358:
2354:
2353:
2348:
2344:
2340:
2331:
2329:
2327:
2323:
2319:
2315:
2308:
2307:
2304:
2303:
2302:
2294:
2286:
2282:
2279:
2278:
2277:
2268:
2267:
2266:
2264:
2260:
2256:
2252:
2242:
2240:
2238:
2234:
2230:
2226:
2222:
2214:
2213:
2208:
2206:
2201:
2194:
2178:
2174:
2170:
2164:
2158:
2157:
2156:
2155:
2154:
2153:
2152:
2151:
2150:
2149:
2148:
2147:
2146:
2145:
2132:
2128:
2124:
2120:
2116:
2115:
2114:
2113:
2112:
2111:
2110:
2109:
2108:
2107:
2106:
2105:
2094:
2091:
2090:
2089:
2080:
2079:
2078:
2077:
2076:
2075:
2074:
2073:
2072:
2071:
2062:
2058:
2054:
2050:
2046:
2045:
2044:
2043:
2042:
2041:
2040:
2039:
2032:
2028:
2024:
2017:
2012:
2011:
2010:
2009:
2008:
2007:
2002:
1999:
1998:
1997:
1988:
1987:
1986:
1985:
1982:
1978:
1974:
1970:
1966:
1962:
1958:
1957:
1956:
1955:
1951:
1947:
1942:
1938:
1932:
1926:
1923:
1919:
1917:
1914:
1910:
1908:
1906:
1900:
1896:
1895:
1894:
1890:
1886:
1882:
1881:
1875:
1871:
1870:
1869:
1868:
1864:
1860:
1851:
1849:
1848:
1844:
1840:
1835:
1826:
1822:
1819:
1818:
1817:
1811:
1810:
1809:
1808:
1805:
1793:
1789:
1785:
1781:
1777:
1776:
1775:
1774:
1770:
1766:
1747:
1740:
1735:
1732:
1729:
1726:
1720:
1712:
1708:
1700:
1699:
1698:
1681:
1674:
1666:
1663:
1660:
1654:
1648:
1640:
1636:
1628:
1627:
1626:
1609:
1602:
1594:
1591:
1588:
1582:
1576:
1568:
1564:
1556:
1555:
1554:
1548:
1538:
1535:
1528:
1524:
1520:
1519:
1516:
1515:
1514:
1511:
1507:
1503:
1502:
1501:
1500:
1499:
1498:
1493:
1490:
1482:
1481:
1480:
1477:
1473:
1472:
1471:
1470:
1467:
1462:
1456:
1453:
1452:
1451:
1444:
1440:
1437:
1429:
1428:
1427:
1426:
1423:
1405:
1402:
1399:
1378:
1375:
1372:
1369:
1366:
1342:
1337:
1328:
1325:
1322:
1302:
1295:
1290:
1287:
1284:
1264:
1257:
1249:
1246:
1235:
1219:
1199:
1192:
1187:
1175:
1169:
1166:
1161:
1157:
1156:
1155:
1154:
1151:
1148:
1141:
1137:
1136:
1135:
1131:
1127:
1123:
1122:70.104.85.250
1119:
1107:
1101:
1100:
1096:
1094:
1089:
1088:
1087:
1084:
1077:
1076:
1075:
1074:
1071:
1070:
1066:
1064:
1058:
1050:
1048:
1047:
1044:
1037:
1033:
1026:
1022:
1017:
1013:
1012:
1008:
1001:
996:
992:
991:
990:
988:
979:
958:
951:
950:
948:
944:
943:
941:
934:
933:
931:
927:
926:
924:
917:
916:
914:
910:
909:
907:
900:
896:
895:
893:
890:something? --
888:
887:
885:
877:
873:
872:
871:
869:
861:Fixed example
860:
855:
848:
847:
846:
844:
835:
833:
831:
827:
823:
815:
811:
807:
806:
805:
803:
795:Cryptanalysis
794:
787:
783:
782:
780:
775:
774:
773:
771:
768:
760:
757:
756:
752:
750:
749:
745:
741:
736:
733:
725:
717:
714:
710:
709:Orbis Latinus
706:
705:
703:
699:
698:
696:
695:Robert Merkel
692:
691:
690:
688:
684:
680:
679:137.111.13.33
676:
666:
664:
662:
658:
654:
650:
644:
642:
638:
625:
617:
609:
608:None listed.
601:
598:
595:
592:
589:
586:
583:
579:
577:
567:
565:
564:
548:
545:(assessed as
544:
543:
533:
529:
528:
524:
520:
514:
511:
510:
507:
490:
486:
482:
481:
476:
473:
469:
468:
464:
457:
452:
449:
446:
442:
430:
413:
409:
408:
403:
402:
397:
394:
390:
389:
385:
382:
379:
376:
372:
367:
363:
357:
349:
348:
338:
334:
329:
328:
321:
316:
308:
306:
305:
301:
298:
294:
293:
289:
287:
286:
282:
279:
278:July 19, 2008
275:
274:
270:
268:
267:
263:
260:
256:
255:
251:
248:
245:
244:
239:
235:
231:
227:
224:
220:
219:
215:
211:
207:
206:
201:
197:
196:Caesar cipher
194:
191:
187:
186:
177:
173:
170:
167:
163:
159:
155:
152:
149:
146:
143:
140:
137:
134:
131:
127:
124:
123:Find sources:
120:
119:
111:
110:Verifiability
108:
106:
103:
101:
98:
97:
96:
87:
83:
81:
78:
76:
72:
69:
67:
64:
63:
57:
53:
52:Learn to edit
49:
46:
41:
40:
37:
36:
32:
26:
25:Caesar cipher
22:
18:
17:
2350:
2335:
2312:— Preceding
2309:
2297:
2296:
2290:
2272:
2271:
2249:— Preceding
2246:
2219:— Preceding
2215:
2209:
2202:
2198:
2169:Theblogger01
2118:
2084:
2083:
2023:Theblogger01
1992:
1991:
1946:Theblogger01
1943:
1939:
1936:
1902:
1878:
1873:
1855:
1836:
1830:
1815:
1813:
1797:
1762:
1696:
1624:
1552:
1521:
1505:
1463:
1460:
1448:
1179:
1159:
1111:
1098:
1092:
1068:
1062:
1054:
1031:
1029:
1024:
994:
983:
898:
875:
864:
839:
819:
809:
798:
763:
758:
743:
738:(If, as the
737:
729:
673:— Preceding
670:
645:
641:Potatocircle
621:
607:
596:
590:
584:
574:
540:
518:
494:Cryptography
485:Cryptography
478:
451:Cryptography
405:
399:
362:WikiProjects
345:
319:
302:
297:June 4, 2023
283:
264:
214:please do so
203:
195:
171:
165:
157:
150:
144:
138:
132:
122:
94:
19:This is the
2332:FA concerns
1422:81.62.90.36
1116:—Preceding
633:2 July 2019
629:28 May 2019
148:free images
31:not a forum
2365:Categories
2200:resource.
1418:0}" /: -->
1391:(assuming
899:decrypting
713:Tinctorius
205:identified
2021:deletion?
1922:Sebastian
1913:Sebastian
1839:Shiningfm
1765:diego_pmc
1234:remainder
1160:effective
753:Inventor?
667:Key space
350:is rated
88:if needed
71:Be polite
21:talk page
2347:Hog Farm
2314:unsigned
2251:unsigned
2233:contribs
2221:unsigned
1969:Wcherowi
1466:Jhohorst
1395:0}": -->
1130:contribs
1118:unsigned
947:Ciaran H
930:Ciaran H
913:Ciaran H
892:Ciaran H
868:Ciaran H
836:Good job
802:Lunkwill
675:unsigned
653:PrimeBOT
352:FA-class
271:Promoted
56:get help
29:This is
27:article.
2343:WP:FACR
2300:Hut 8.5
2275:Hut 8.5
2087:Hut 8.5
2016:Hut 8.5
1995:Hut 8.5
1905:Wwwwolf
1880:wwwwolf
1852:Infobox
1816:Hut 8.5
1801:— Matt
1531:— Matt
1506:decrypt
1486:— Matt
1433:— Matt
1144:— Matt
1080:— Matt
1060:it up.
1040:— Matt
1004:— Matt
954:— Matt
937:— Matt
920:— Matt
903:— Matt
881:— Matt
851:— Matt
702:Marcika
521:on the
249:Process
154:WP refs
142:scholar
1889:growls
1803:Crypto
1533:Crypto
1488:Crypto
1435:Crypto
1146:Crypto
1082:Crypto
1042:Crypto
1006:Crypto
995:aren't
956:Crypto
939:Crypto
922:Crypto
905:Crypto
883:Crypto
853:Crypto
830:— Matt
814:— Matt
786:— Matt
770:— Matt
407:spoken
358:scale.
252:Result
126:Google
2310:ole
2121:"? -
1885:barks
1872:Huh.
1831:Hi :)
1827:Group
1780:Zsero
1510:Zsero
1476:Zsero
1403:: -->
1212:when
1140:ROT13
1095:roken
1065:roken
576:To-do
339:This
198:is a
169:JSTOR
130:books
84:Seek
2352:Talk
2322:talk
2259:talk
2229:talk
2225:Xarg
2173:talk
2163:DVdm
2127:talk
2123:DVdm
2057:talk
2053:DVdm
2027:talk
1977:talk
1973:DVdm
1950:talk
1903:But
1899:here
1863:talk
1843:talk
1784:talk
1769:talk
1376:<
1359:and
1126:talk
843:Deco
744:this
683:talk
657:talk
631:and
513:High
309:Kept
290:Kept
246:Date
162:FENS
136:news
73:and
1748:27.
1741:mod
1682:26.
1675:mod
1610:31.
1603:mod
1338:mod
1296:mod
1258:mod
1236:of
1193:mod
824:or
748:FOo
651:by
176:TWL
2367::
2324:)
2261:)
2235:)
2231:•
2175:)
2129:)
2059:)
2029:)
1979:)
1952:)
1911:◄
1891:)
1865:)
1845:)
1786:)
1771:)
1733:−
1664:−
1592:−
1412:0}
1370:≤
1326:≡
1247:−
1165:ww
1132:)
1128:•
1038:.
779:ww
685:)
659:)
643:.
549:).
454::
156:)
54:;
2320:(
2257:(
2227:(
2171:(
2165::
2161:@
2125:(
2055:(
2025:(
2018::
2014:@
1975:(
1948:(
1887:/
1883:(
1861:(
1841:(
1782:(
1767:(
1736:n
1730:x
1727:=
1724:)
1721:x
1718:(
1713:n
1709:D
1670:)
1667:n
1661:x
1658:(
1655:=
1652:)
1649:x
1646:(
1641:n
1637:D
1598:)
1595:n
1589:x
1586:(
1583:=
1580:)
1577:x
1574:(
1569:n
1565:D
1406:0
1400:n
1379:n
1373:y
1367:0
1346:)
1343:n
1335:(
1329:x
1323:y
1303:n
1291:x
1288:=
1285:y
1265:5
1253:)
1250:2
1244:(
1220:x
1200:n
1188:x
1124:(
1099:S
1093:B
1069:S
1063:B
681:(
655:(
600:R
597:·
594:W
591:·
588:H
585:·
582:E
578::
525:.
364::
216:.
172:·
166:·
158:·
151:·
145:·
139:·
133:·
128:(
58:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.