CIPHERS & CODES
CRYPTOGRAPHY
CIPHER LIST
✔ASCII
Type: Substitution
✅Binary
A-01000001 B-01000010 C-01000011 D-01000100 E-01000101 F-01000110 G-01000111 H-01001000 I-01001001 J-01001010 K-01001011 L-01001100 M-01001101 N-01001110 O-01001111 P-01010000 Q-01010001 R-01010010 S-01010011 T-01010100 U-01010101 V-01010110 W-01010111 X-01011000 Y-01011001 Z-01011010 a-01100001 b-01100010 c-01100011 d-01100100 e-01100101 f-01100110 g-01100111 h-01101000 i-01101001 j-01101010 k-01101011 l-01101100 m-01101101 n-01101110 o-01101111 p-01110000 q-01110001 r-01110010 s-01110011 t-01110100 u-01110101 v-01110110 w-01110111 x-01111000 y-01111001 z-01111010 'space'-00100000
✅Decimal
A-65 B-66 C-67 D-68
E-69 F-70 G-71 H-72
I-73 J-74 K-75 L-76
M-77 N-78 O-79 P-80
Q-81 R-82 S-83 T-84
U-85 V-86 W-87 X-88
Y-89 Z-90 a-97 b-98
c-99 d-100 e-101 f-102
g-103 h-104 i-105 j-106
k-107 l-108 m-109 n-110
o-111 p-112 q-113 r-114
s-115 t-116 u-117 v-118
w-119 x-120 y-121 z-122
✅Hexadecimal
A-41 B-42 C-43 D-44
E-45 F-46 G-47 H-48
I-49 J-4A K-4B L-4C
M-4D N-4E O-4F P-50
Q-51 R-52 S-53 T-54
U-55 V-56 W-57 X-58
Y-59 Z-5A a-61 b-62
c-63 d-64 e-65 f-66
g-67 h-68 i-69 j-6A
k-6B l-6C m-6D n-6E
o-6F p-70 q-71 r-72
s-73 t-74 u-75 v-76
w-77 x-78 y-79 z-7A
✅Octal
A-101 B-102 C-103 D-104
E-105 F-106 G-107 H-110
I-111 J-112 K-113 L-114
M-115 N-116 O-117 P-120
Q-121 R-122 S-123 T-124
U-125 V-126 W-127 X-130
Y-131 Z-132 a-141 b-142
c-143 d-144 e-145 f-146
g-147 h-150 i-151 j-152
k-153 l-154 m-155 n-156
o-157 p-160 q-161 r-162
s-163 t-164 u-165 v-166
w-167 x-170 y-171 z-172
✔LATIN CODE
Type: Numbers
> latin alphabet consist of 26 letters. A position in the alphabet is assigned to each letter. The 1 position for example is assigned to letter a.
A=01 N=14
B=02 O=15
C=03 P=16
D=04 Q=17
E=05 R=18
F=06 S=19
G=07 T=20
H=08 U=21
I =09 V=A
J=10 W=23
K=11 X=24
L=12 Y=25
M=13 Z=26
✔ATBASH
Type: Substitution
> atbash is a type of substitution cipher in which the first letter (a) is substituted to the last letter (z), second letter(b) is substituted to penultimate (y), and so on.
A=Z
B=Y
C=X
D=W
E=V
F=U
G=T
H=S
I=R
J=Q
K=P
L=O
M=N
✔CEASAR SHIFT / GRONSFELD CIPHER
Type: Substitution
> ceasar cipher or gronsfeld cipher is a type of encryption to which associated a shift of a fixed number of a letter (towards left or right). Each letter is then relaced by that obtained after performing the shift.
(Note: encoding or decoding depends on the number of shift)
Encrypt-shift forward
Decrypt-shift backward
Example:
Shift: 3
1.)LOVE
encrypted=ORYH
decrypted=ILSB
2.) JUHDW
encrypted=MXKGZ
decrypted=GREAT
✔CAESAR'S BOX
Example:
HBDY-AIAO-PRYU-PTT-YHO
(Note: arrange it like stack and read by column from top to bottom)
Stack form:
HBDY
AIAO
PRYU
PTT
YHO
Answer = HAPPY BIRTHDAY TO YOU
✔VANITY CODE
Type: Substitution
Keypad keys:
1=.,
2=abc
3=def
4=ghi
5=jkl
6=mno
7=pqrs
8=tuv
9=wxyz
0=space
Example:
356937 = flower
6676464 = morning
✔MORSE CODE
Type: Trasposition
> morse code is a system to encode thanks to short and long impulses. Each letter or punctuation mark is associated with a sequence of signals. These signals are translated to the following characters:
✅Dot(.) is the elementary pulse
✅Comma(,) represents pulse three times longer than the point
✅Space( ) represent separation between two letters
✅Vergule(/) represents separation between words
A= .-
B= -...
C= -.-.
D= -..
E= .
F= ..-.
G= --.
Η= ....
I= ..
J= .---
K= -.-
L= .-..
M= --
N= -.
O= ---
P= .--.
Q= --.-
R= .-.
S= ...
T= -
U= ..-
V= ...-
W= .--
X= -..-
Y= -.--
Z= --..
Example:
-.-. --- -. -.. .. - .. --- -. = CONDITION
✔KEYWORD CIPHER
Type: Substitution
(Note: encoding or decoding is based on the keyword input)
(Note: keyword given will be inserted as first in the sequence of alphabet and letters should never repeat)
Example
Keyword: GOD
A=G N=M
B=O O=N
C=D P=P
D=A Q=Q
E=B R=R
F=C S=S
G=E T=T
H=F U=U
I=H V=V
J=I W=W
K=J X=X
L=K Y=Y
M=L Z=Z
Cipher: JMNW = KNOW
✔ROT 13
> ROT13 ("rotate by 13 places", sometimes hyphenated ROT-13) is a simple letter substitution cipher that replaces a letter with the letter 13 letters after it in the alphabet.
Type:
A=Z
B=Y
C=X
D=W
E=V
F=U
G=T
H=S
I=R
J=Q
K=P
L=O
M=N
✔BACON CIPHER
Type: Substitution
> To encode a message, each letter of the plaintext is replaced by a group of five of the letters 'A' or 'B'. This replacement is a binary encoding and is done according to the alphabet of the Baconian cipher.
A=AAAAA B=AAAAB C=AAABA D=AAABB E=AABAA F=AABAB G=AABBA H=AABBB I/J=ABAAA
K=ABABA L=ABABB M=ABBAA
N=ABBAB O=ABBBA P=ABBBB
Q=BAAAA R=BAAAB S=BAABA T=BAABB U/V=BABAA W=BABBA X=BABBB Y=BBAAA Z=BBAAB
✔REVERSE CIPHER
Types: Words
> two modes are available in this code. First reverses the whole text, second reverses letters word by word.
Example:
1st mode
1.) NEGYXO = OXYGEN
2.) YRANOITCID = DICTIONARY
3.)1ST: REKEES NOITNETTA = ATTENTION SEEKER
4.)2nd: NOITNETTA REKEES = ATTENTION SEEKER
YOU ARE READING
DEEP WEB: facts, conspiracies, solved, unsolved cases, murders and mysteries
Science FictionThe deep web,invisible web or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines for any reason. The opposite term to the deep web is the surface web. The deep web includes many very common uses such...
