What's new

Closed The missing code lists (must read)

Status
Not open for further replies.

zkrittlez_1337

Forum Veteran
Joined
Jul 1, 2016
Posts
877
Reaction
2,052
Points
679
CIPHERS & CODES
CRYPTOGRAPHY
CIPHER LIST
✔ASCII
Type: Substitution
 Binary
A-01000001 B-01000010 C-01000011 D-01000100 E-01000101 F-01000110 G-01000111 H-01001000 I-01001001 J-01001010 K-01001011 L-01001100 M-01001101 N-01001110 O-01001111 P-01010000 Q-01010001 R-01010010 S-01010011 T-01010100 U-01010101 V-01010110 W-01010111 X-01011000 Y-01011001 Z-01011010 a-01100001 b-01100010 c-01100011 d-01100100 e-01100101 f-01100110 g-01100111 h-01101000 i-01101001 j-01101010 k-01101011 l-01101100 m-01101101 n-01101110 o-01101111 p-01110000 q-01110001 r-01110010 s-01110011 t-01110100 u-01110101 v-01110110 w-01110111 x-01111000 y-01111001 z-01111010 'space'-00100000
 Decimal
A-65 B-66 C-67 D-68
E-69 F-70 G-71 H-72
I-73 J-74 K-75 L-76
M-77 N-78 O-79 P-80
Q-81 R-82 S-83 T-84
U-85 V-86 W-87 X-88
Y-89 Z-90 a-97 b-98
c-99 d-100 e-101 f-102
g-103 h-104 i-105 j-106
k-107 l-108 m-109 n-110
o-111 p-112 q-113 r-114
s-115 t-116 u-117 v-118
w-119 x-120 y-121 z-122
 Hexadecimal
A-41 B-42 C-43 D-44
E-45 F-46 G-47 H-48
I-49 J-4A K-4B L-4C
M-4D N-4E O-4F P-50
Q-51 R-52 S-53 T-54
U-55 V-56 W-57 X-58
Y-59 Z-5A a-61 b-62
c-63 d-64 e-65 f-66
g-67 h-68 i-69 j-6A
k-6B l-6C m-6D n-6E
o-6F p-70 q-71 r-72
s-73 t-74 u-75 v-76
w-77 x-78 y-79 z-7A
 Octal
A-101 B-102 C-103 D-104
E-105 F-106 G-107 H-110
I-111 J-112 K-113 L-114
M-115 N-116 O-117 P-120
Q-121 R-122 S-123 T-124
U-125 V-126 W-127 X-130
Y-131 Z-132 a-141 b-142
c-143 d-144 e-145 f-146
g-147 h-150 i-151 j-152
k-153 l-154 m-155 n-156
o-157 p-160 q-161 r-162
s-163 t-164 u-165 v-166
w-167 x-170 y-171 z-172
✔LATIN CODE
Type: Numbers
> latin alphabet consist of 26 letters. A position in the alphabet is assigned to each letter. The 1 position for example is assigned to letter a.
A=01 N=14
B=02 O=15
C=03 P=16
D=04 Q=17
E=05 R=18
F=06 S=19
G=07 T=20
H=08 U=21
I =09 V=A
J=10 W=23
K=11 X=24
L=12 Y=25
M=13 Z=26
✔ATBASH
Type: Substitution
> atbash is a type of substitution cipher in which the first letter (a) is substituted to the last letter (z), second letter(b) is substituted to penultimate (y), and so on.
A=Z
B=Y
C=X
D=W
E=V
F=U
G=T
H=S
I=R
J=Q
K=P
L=O
M=N
✔CEASAR SHIFT / GRONSFELD CIPHER
Type: Substitution
> ceasar cipher or gronsfeld cipher is a type of encryption to which associated a shift of a fixed number of a letter (towards left or right). Each letter is then relaced by that obtained after performing the shift.
(Note: encoding or decoding depends on the number of shift)
Encrypt-shift forward
Decrypt-shift backward
Example:
Shift: 3
1.)LOVE
encrypted=ORYH
decrypted=ILSB
2.) JUHDW
encrypted=MXKGZ
decrypted=GREAT
✔CAESAR'S BOX
Example:
HBDY-AIAO-PRYU-PTT-YHO
(Note: arrange it like stack and read by column from top to bottom)
Stack form:
HBDY
AIAO
PRYU
PTT
YHO
Answer = HAPPY BIRTHDAY TO YOU
✔VANITY CODE
Type: Substitution
Keypad keys:
1=.,
2=abc
3=def
4=ghi
5=jkl
6=mno
7=pqrs
8=tuv
9=wxyz
0=space
Example:
356937 = flower
6676464 = morning
✔MORSE CODE
Type: Trasposition
> morse code is a system to encode thanks to short and long impulses. Each letter or punctuation mark is associated with a sequence of signals. These signals are translated to the following characters:
 Dot(.) is the elementary pulse
 Comma(,) represents pulse three times longer than the point
 Space( ) represent separation between two letters
 Vergule(/) represents separation between words
A= .-
B= -...
C= -.-.
D= -..
E= .
F= ..-.
G= --.
Η= ....
I= ..
J= .---
K= -.-
L= .-..
M= --
N= -.
O= ---
P= .--.
Q= --.-
R= .-.
S= ...
T= -
U= ..-
V= ...-
W= .--
X= -..-
Y= -.--
Z= --..
Example:
-.-. --- -. -.. .. - .. --- -. = CONDITION
✔KEYWORD CIPHER
Type: Substitution
(Note: encoding or decoding is based on the keyword input)
(Note: keyword given will be inserted as first in the sequence of alphabet and letters should never repeat)
Example
Keyword: GOD
A=G N=M
B=O O=N
C=D P=P
D=A Q=Q
E=B R=R
F=C S=S
G=E T=T
H=F U=U
I=H V=V
J=I W=W
K=J X=X
L=K Y=Y
M=L Z=Z
Cipher: JMNW = KNOW
✔ROT 13
> ROT13 ("rotate by 13 places", sometimes hyphenated ROT-13) is a simple letter substitution cipher that replaces a letter with the letter 13 letters after it in the alphabet.
Type:
A=Z
B=Y
C=X
D=W
E=V
F=U
G=T
H=S
I=R
J=Q
K=P
L=O
M=N
✔BACON CIPHER
Type: Substitution
> To encode a message, each letter of the plaintext is replaced by a group of five of the letters 'A' or 'B'. This replacement is a binary encoding and is done according to the alphabet of the Baconian cipher.
A=AAAAA B=AAAAB C=AAABA D=AAABB E=AABAA F=AABAB G=AABBA H=AABBB I/J=ABAAA
K=ABABA L=ABABB M=ABBAA
N=ABBAB O=ABBBA P=ABBBB
Q=BAAAA R=BAAAB S=BAABA T=BAABB U/V=BABAA W=BABBA X=BABBB Y=BBAAA Z=BBAAB
✔REVERSE CIPHER
Types: Words
> two modes are available in this code. First reverses the whole text, second reverses letters word by word.
Example:
1st mode
1.) NEGYXO = OXYGEN
2.) YRANOITCID = DICTIONARY
3.)1ST: REKEES NOITNETTA = ATTENTION SEEKER
4.)2nd: NOITNETTA REKEES = ATTENTION SEEKER
✔PLAYFAIR
Type: Substitution
> playfair cipher uses an array of 5x5 containing a keyword or phrase. The first step is to create a grid based on the key. The second step is to encrypt the letters of the message by selecting them in pairs.
Key: melons
(Note: grid size is 5x5 and i/j can interchange)
M|E|L|O|N
S|A|B|C|D
F|G|H|I |K
P|Q|R|T|U
V|W|X|Y|Z
Plaintext: VALENTINES
VA LE NT IN ES
Ciphertext: WSOLOUJOMA
WS OL OU JO MA
✔SCYTALE CIPHER
Type: Transposition
> Suppose the rod allows one to write four letters around in a circle and five letters down the side of it. To decrypt, all one must do is wrap the leather strip around the rod and read across.
(Note: make a table and insert there your input, table is based on diameter)
Example message:
Plaintext: Hey i was doing just fine before i met you
Diameter: 7
H|E|Y| I|W|A|S
D|O| I|N|G|J|U
S|T|F| I|N|E|B
E|F|O|R|E| I|M
E|T|Y|O|U|
Ciphertext: HDSEEEOTFTYIFOY
INIROWGNEUAJEISUBM
✔ROTATION CODE
Type: Substitution
(Note: it's formula forencryption is f(x)=(ax)mod26 and for decryption is f(y)=a^-1(y)mod26, where x or y corresponds to the position of the letter in the alphabet, e.g. a=0, b=1, c=2.....z=25, mod26 correspond to the limit of the rotation, and a correspond to any input number)
Example: (encryption)
Plaintext: KING
F(x)=(ax)mod26
a=2
K=10, f(x)=(2*10)mod26=20
�I =8, f(x)=(2*8)mod26=16
N=13, f(x)=(2*13)mod26=26
G=6, f(x)=(2*6)mod26=12
K=20=U
I =16=Q
N=26=A
G=12=M
Ciphertext: UQAM
Example: (decryption)
Ciphertext: UQAM
F(y)=a^-1(y)mod26
a=2
U=20, f(y)=2^-1(20)mod26=10
Q=16, f(y)=2^-1(16)mod26=8
A=26, f(y)=2^-1(26)mod26=13
M=12, f(y)=2^-1(12)mod26=6
U=10=K
Q=8=I
A=13=N
M=6=G
Plaintext: KING
(Note: mod26, when no>25, then it will rotate back to 0, 26=0, 27=1, 28=2 and so on, where a=0 and z=25, e.g. 30=e)
✔AFFINE CIPHER
Type: Substitution
(Note: it's formula for encryption is f(x)=(ax+b)mod n, and for decryption is f(y)=a^-1(y-b)mod n, where "a" should be coprime of "n", "x" or "y" corresponds on the position of the letter in the alphabet (see rotation code), and "b" is any value of input, and mod n is the limit of rotation)
Example: (encryption)
Plaintext: AFFINE
a=5, b=8, n=26
F(x)=(ax+b)mod26
A=0, F(0)=(5(0)+8)mod26=8
F=5, F(5)=(5(5)+8)mod26=33
F=5, F(5)=(5(5)+8)mod26=33
I =8, F(8)=(5(8)+8)mod26=48
N=13, F(13)=(5(13)+8)mod26=73
E=4, F(4)=(5(4)+8)mod26=28
A=08=I
F=33=H
F=33=H
I =48=W
N=73=V
E=28=C
Ciphertext: IHHWVC
Example: (decryption)
Ciphertext: IHHWVC
a=5, b=8, n=26
F(y)=a^-1(y-b)mod n
I =08, f(8)=5^-1(8-8)mod26=0
H=33, f(33)=5^-1(33-8)mod26=5
H=33, f(33)=5^-1(33-8)mod26=5
W=48, f(48)=5^-1(48-8)mod26=8
V=73, f(73)=5^-1(73-8)mod26=13
C=28, f(28)=5^-1(28-8)mod26=4
I =0=A
H=5=F
H=5=F
W=8=I
V=13=N
C=5=E
Plaintext: AFFINE
✔RAIL FENCE CIPHER
Type: Transposition
(Note: shift depends on no. key or rails, and letters should be written downward and diagonally, let `=no. of shift or rails)
Plaintext: HEY I JUST MET YOU AND THIS IS CRAZY
shift: 3
h ` ` ` j ` ` ` m ` ` ` o ` ` ` d ` ` ` s ` ` ` r ` ` `
` e ` i ` u ` t ` e ` y ` u ` n ` t ` i ` i ` c ` a ` y
` ` y ` ` ` s ` ` ` t ` ` ` a ` ` ` h ` ` ` s ` ` ` z `
Ciphertext:
HJMODSREIUTEYUNTIICAYYSTAHSZ
✔POLYBIUS SQUARE
Type: Numbers
> Polybius square, also known as the Polybius checkerboard, is a device invented by the Ancient Greekhistorian and scholar Polybius, for fractionating plaintext characters so that they can be represented by a smaller set of symbols.
(Note: create a table of any size, readings should start in column then row)
Example:5x5
 A B C D E
A|A|B|C|D|E
B|F|G|H|J|K
C|L|M|N|O|P
D|Q|R|S|T|U
E|V|W|X|Y|Z
Ciphertext: CB CD CC BD AA ED
Plaintext: M O N D A Y
✔VIGENERE CIPHER
Type: Substitution
(Note: keywords sets at the starting point of alphabet and keyword shoud be inserted in the first column of the table mot in the row, keyword shoud be repeated until it reach the same value or no. of the text )
Example:
Plaintext: JUPITER
Keyword: mapsmap
(See vigenere table)
Ciphertext: VUEAFEG
✔HITMAN CIPHER
If A is A then N is N.
A~A
B~Z
C~Y
D~X
E~W
F~V
G~U
H~T
I~S
J~R
K~Q
L~P
M~O
N~N
Example
Ciphertext: TSHOAN
Plaintext: HITMAN
✔BIFID CIPHER
Type: Substitution
CIPHER: First column and firs row contains numbers while the rest is letters)
Example: 5x5
 1 2 3 4 5
1|A|B|C|D|E|
2|F|G|H| I |K|
3|L|M|N|O|P|
4|Q|R|S|T|U|
5|V|W|X|Y|Z|
Ciphertext: 3,2 3,4 3,3 4,3 4,4 1,5 4,2 or
Ciphertext: 32 34 33 43 44 15 42
Plaintext: MONSTER
✔TAP CODE
A(. .) B(. ..)
C(. ...) D(. ....)
E (. .....) F (.. .)
G(.. ..) H(.. ...)
I(.. ....) J(.. .....)
K(. ...) L(... .)
M(... ..) N(... ...)
O(... ....) P(... .....)
Q(.... .) R(.... ..)
S(.... ...) T(.... ....)
U(.... .....) V(..... .)
W(..... ..) X(..... ...)
Y(..... ....) Z(..... .....)
*space* (null)
✔CLOCK CODES
(Exponents = Arithmetic Modula)
A~ B~ C~ D~ E~ F~ G~ H~ I~ J~ K~ L~ M~ ² N~ ² O~ ² P~ ² Q~ ² R~ ² S~
² T~ ² U~ ² V~ ² W~ ² X~ ² Y~ ³ Z~ ³
DOT DOT CODES
A(°••••)
B(•°•••)
C(••°••)
D(•••°•)
E(••••°)
F(•°°°°)
G(°•°°°)
H(°°•°°)
I(°°°•°)
J(°°°°•)
K(°•°•°)
L(•°•°•)
M(••°°°°)
N(°°••°°)
O(°°°°••)
P(°°••••)
Q(••°°••)
R(••••°°)
S(•°•°°)
T(°•°°•)
U(•°°•°)
V(°°•°•)
W(°•°••)
X(•°••°)
Y(°••°•)
Z(••°•°)
✔NEWS CIPHER
(Note: make a table of letters, whether theres a keyword or none, 5x5 from A to Z, where C/K and I/J are interchangeable.)
Legends:
N ~ North
E ~ East
W ~ West
S ~ South
NE ~ North East
NW ~ North West
SE ~ South East
SW ~ South West
A | B | C | D | E
F | G | H | I | J
L | M| N | O | P
Q | R | S | T | U
V | W| X | Y | Z
Example:
Ciphertext: NWFNVNEDSBWISWFN
N(W) F(N) V(NE) D(S) B(W) I(SW) F(N)
Plaintext: MARIANA
✔CROSS CODE
A ~ †††
B ~ +††
C ~ †+†
D ~ ††+
E ~ †++
F ~ +†+
G ~ ++†
H ~ ࠠ
I ~ †‡†
J ~ ††‡
K ~ ‡++
L ~ +‡+
M ~ ++‡
N ~ †‡‡
O ~ ‡†‡
P ~ ‡‡†
Q ~ +‡‡
R ~ ‡+‡
S ~ ‡‡+
T ~ ‡†+
U ~ †+‡
V ~ +‡†
W ~ ‡+†
X ~ +†‡
Y ~ †‡+
Z ~ +++
✔ARROW CODES
(Note: Create a table of letters 5x5 either theres a keyword or none, and moves starts after the first given letter)
Legends: ←↑↓→
Moves: ¹ ² ³ ⁴
/-separates each letters
A | B | C | D | E
F | G | H | I | J
L | M| N | O | P
Q | R | S | T | U
V | W| X | Y | Z
Example:
Codex: P/ ←⁴↑²/ →²↓²/ →¹↑²/ ↓²/ ←²↓¹/ ←¹↑³/
Plaintext: PANDORA
✔PIGPEN and TEMPLAR CIPHER
(See pigpen image)
(See templar image <•)
> the pigpen and templar cipher is a geometric simple substitution cipher, which exchanges letters for sybols which are fragments of grid.
- Black Knight.
We Are Forbidden.
Crdts. Forbidden Eye

and thanks to Jasmine of D.A
for sharing..
 
Status
Not open for further replies.
Back
Top