List of Ciphers and Codes (All Types with Examples)

Ciphers form the basis of cryptography. This is a list of ciphers and codes, those that need a key for encryption and decryption process and also the simple ciphers.

The message in its original form before it’s encrypted is called plaintext and after it has undergone transformation it’s called ciphertext.

A cipher is basically a formula or an algorithm that is done step by step for both encryption and decryption of a message.

Ciphers are really important in keeping information secure.

Generally any given cipher scrambles a set of letters that make a message into a form that is unreadable to unintended parties.

Ciphers are important part of cryptography as they ensure that the communications between two parties is private and secure.

Are you interested in finding out more about ciphers and codes?

The Codebreakers – The Story of Secret Writing book by David Kahn is what I would start with.

In this guide I will be highlighting all ciphers and algorithms. There are also encoder, decoder and translator tools to further learn how these ciphers work.

In the future articles I will be providing implementation of ciphers in various programming languages.Also tips and tricks you can use to break common ciphers (cryptanalysis).

Note that there is a difference between codes and cryptography ciphers. Codes basically are concerned with semantics while ciphers emphasize syntax and symbols.

Working with codes is made faster by storing them in a codebook while cryptographic ciphers are controlled by a set of steps or an algorithm.

Here is a list of 110 ciphers used from the historical ages to modern times organized in different types and categories.

List of Ciphers

A list of Polyalphabetic Substitution ciphers

  • Alberti cipher

This uses a set of two mobile circular disks which can rotate easily.

  • Bazeries cipher

This system combines two grids commonly called (polybius) and a single key for encryption.

  • Bellaso cipher

This cipher uses one or two keys and it commonly used with Italian alphabet.

  • Chaocipher cipher

This encryption algorithm uses two evolving disk alphabet.

This is also very similar to vigenere cipher. The key used in encryption and decryption needs to be a number.

  • Jefferson wheel cipher

This one uses a cylinder with several wheels for its operation.

  • Phillips cipher

It uses 8 grids that are all generated from a single keyword.

  • Trithemius cipher

It works through a series of letter shifting. The first letter is not shifted, the second letter is shifted up by 1 , the third letter by 2 up shifts and the rest.

  • Vernam cipher(one time pad)

In this cipher the key is as long as the plaintext making it very hard to break. It is very similar to vigenere cipher.

This cipher works by replacing a letter by another different one. Often a key and a table is used for both encryption and decryption process.

A list of Monoalphabetic Substitution ciphers

This encryption scheme uses substitution of a letter by another one further in the alphabet. It is commonly known as shift cipher or caesar code.

  • Atbash mirror code

It is from Hebraic alphabet. The first letter of the alphabet is substituted with the last one, the second letter, with the second last one and the same pattern follows.

This is a Caesar cipher with a shift of 13 and which allows for reciprocals.

  • Affine cipher

It uses a function with additions and multiplications to convert a letter into another letter with value (ax + b) mod 26.

It works by replacing each letter by its coordinates of its position in a square or grid. Often a key is used to generate a deranged alphabet to fill out the grid.

It uses a bi-literal substitution alphabet which replaces a character with a group of five formed with two letters, often A and B.

A list of Transposition ciphers

  • ADFGVX cipher

It uses a 6 by 6 square grid to replace the plaintext by pairs of letters among A, D, F, G, V and X. Then a permutation of ciphertext letters is done.

  • ADFGX cipher

This one uses a 5 by 5 square grid and then a double mechanism of substitution followed by transposition.

  • AMSCO cipher

This basically uses column transpositions. It was created by A.M Scott.

  • Alphabetic disordering cipher

This works by separating a given text or a sentence into pieces of alphabetically arranged letters and then shuffles them to encode.

  • Caesar box cipher

This was used in the Roman Empire. Letters of the message are written in lines in a square or rectangle form and then read by column.

  • Double transposition cipher

This one uses two transpositions ciphers. Either with a single or two keys which is applied on each column.

  • Redefence cipher

It’s very similar to rail fence but it has a key that defines the order in which the lines are supposed to be read after writing has been done in zig-zag form.

  • Scytale cipher

It was used by spartans in Greece. A band is wrapped around a rod then a message is written and then when the band is unrolled it produces the ciphertext.

  • Spiral cipher

This encryption scheme works by writing a text in a quadrangular spiral and then read by columns.

This one changes the order of the letters in a given text by placing it a grid. It is often called columns permutation.

A list of Mechanical ciphers

This is an electromechanical system that uses rotors. It was used by the Germans during the second world war.

  • Lorenz cipher

This is an example of a stream cipher and it was used by the Germans in the second world war.

A list of Symbol Substitution ciphers

  • Atlantean Language cipher

This is fictional language made up of symbols that was created for Disney movie (Atlantis).

  • Babylonian numbers cipher

This one uses a mix of base 60 (also called sexagesimal) and base 10 (also called decimal).

This is a code by alphanumeric substitution of the letters by an image. Images are connected to each other to form a maze.

  • Braille alphabet cipher

This is a special writing system for the blind which can also be described with numbers.

  • Chinese code cipher

This uses vertical and horizontal lines that cross to encode letters which is controlled by the position of the vowels and consonants in the alphabet.

  • Dancing men cipher

This is was first used in Sherlock Holmes book. It’s a monoalphabetic substitution cipher where little men are shown with legs and arms while dancing.

  • Dotsies font cipher

It’s alphabet uses letters composes of points in vertical position that replaces the letters of the Latin alphabet.

  • Draconic language cipher

This is the language of the dragons and there exist many variants.

  • Flag semaphore cipher

This is a visual communication system using hand held flags by a standing man.

  • French sign language cipher

This is also a visual language used by the deaf and the dump to communicate. It basically has a set of visual alphabet that allows one to spell words.

  • Gnommish language cipher

This is an alphabet based on symbols that were created by Eoin Colfer.

  • Ideograms cipher

This is used for encryption by creating unique ideograms to encode numbers and letters with elements like dots, circles and lines each with a specific value.

  • Iokharic language cipher

This is a dragon language with claw symbols. For example in Dungeons and dragons.

  • Lingua Ignota cipher

It means unknown language in Latin. It’s an alphabet that was created by Hildergard of Bingen and it has 23 characters.

  • Maritime signals code cipher

This is a code that substitutes flags to letters.

  • Mary Stuart code cipher

This is a substitution cryptogram by symbols extended to the words used by the Queen of Scots.

  • Maya numerals cipher

It uses a mix of base 20 and base 5 ( and also 360 numerals).

  • Music sheet cipher

Each note of the music sheet is associated to a letter or a number.

  • Oghamic alphabet cipher

This one uses a medieval and Celtic alphabet with horizontal and vertical lines.

Is also called masonic cipher or Freemason’s cipher. It uses a substitution alphabet composed of grid parts and dots.

  • Semaphore trousers cipher

It’s very similar to semaphore alphabet. Signs are determined by legs with pants.

  • Sheikah language cipher

This is an alphabet that appears in the Zelda – Breath of the Wild (a video game).

  • Symbol font cipher

This is commonly used in Microsoft windows and contains the letters of the Greek alphabet.

  • Knights Templars cipher

It’s a substitution code that replaces letters with symbols from Maltese Cross, icon of the Temple.

  • Tom Tom code cipher

This is a code based on diagonal bars (slash and anti-slash) that is very similar to both Morse and Chinese codes.

  • Unown pokemon alphabet cipher

It’s a Psy Pokemon of the second generation which can take different forms that imitate letters of the Latin alphabet.

  • Webdings font cipher

It uses pictograms and dingbats. Common in Windows operating system.

  • Wingdings font cipher

It’s a character font with a set of pictographs or dingbats used mainly on the Windows os.

  • Mexican army cipher wheel

Is an encryption system that uses four mobile circular disks with numeric codes.

  • Modulo cipher

Modulo calculations are applied on numbers to encode messages with calculated values.

  • ALT-Codes converter

These are used to describe ALT key combination on the keyboard generating ASCII text or Unicode characters on Windows.

  • Acéré cipher

This one associates the letter A to a music note Ré(French music notation).

  • Alphabetical ranks added cipher

It adds up the rank value from the current letter to the previous value. Where (A=1, B=2……).

  • Arnold’s cipher

Is a book cipher that uses either William Blackstones Commentaries on the laws of England or Nathan Bailey’s dictionary.

  • Arthur and the Invisibles Alphabet

This was used in the book and movie from Luc besson (Arthur and the Minimoys (Invisibles).

  • Base91 cipher

This is an encoding method that uses ASCII characters and limits the size of the encoded data.

  • Binary code

This is a numeric system that uses base 2 in informatics with binary notation (0 and 1).

It uses a book as an encryption index where each letter is coded by the rank of the word in the book.

  • Cardan grille

This is a mask superimposed to the text that bring up some letters to make a message.

  • Consonants/vowels rank cipher

The 6 vowels of the Latin alphabet are coded by row(from 1 to 6) and the 20 consonants are also coded by row (from 1 to 20).

  • DTML code

These are combinations of sounds frequencies used in phones when dialing numbers.

  • Fractionated morse cipher

This is very similar to morse code. It basically adds an over encryption by splitting dots and dashes in groups of three.

  • French postal barcode

It’s a code that uses bars and dots. It is used to read read postcodes digitally when sorting mail with processing machines. Was commonly used by the French LaPoste company.

  • Gold bug cipher

It’s based on the story (The gold bug) from Edgar Allan Poe.

  • Goron language

It’s used in the Zelda ( a video game series like Twilight Princess) by a Hyrule people.

  • Javascript keycodes

These are numbers associated with keyboard keys that are handled by JavaScript events.

  • Keyboard change cipher

This works by typing the keys in position P on the keyboard in the same key in position P but on another keyboard layout (QWERTY / DWORAK).

  • Keyboard coordinates

It translates keyboard keys into column or line and the reverse. Keyboard keys are identifies by the coordinates marked by the number of row and column.

  • Keyboard shift cipher

This works by typing a letter close to another on a computer keyboard. The shift can be: right, left, up and down.

  • LSPK90 clockwise

This is readable vertically with a rotation of 90 degrees clockwise. It was proposed by Michel Kern.

It replaces each letter by its position in the alphabet. For instance A=1 and B=2.

  • Morse code

This encryption scheme works by encoding a message by short and long impulsion.

  • Music notes

This uses two music notations to encode messages. Either: A B C D or the DO RE MI FA SOL.

  • Navajo code cipher

It’s a military language. It has vocabulary for military use and also an alphabet.

It’s an enhanced version of polybius square cipher.

  • Periodic table cipher

It works by ordering the chemical elements by their atomic number and associating them with symbols made of 1 to 3 letters.

  • Prime numbers cipher

This works by associating each letter to a given prime number.

  • ROT cipher

This is a type of shift encryption scheme. Similar to caesar cipher.

  • ROT-47 cipher

This is a variant of ROT-13. It is best for ASCII characters and has a subset of 94 characters.

  • ROT-5 cipher

It’s application of ROT-13 to the numbers. Does a shift of 5 making it reversible for numbers.

  • Short weather WKS cipher

These are codes used by Germans during the world war two for meteorological purposes.

  • T9 cipher (SMS)

This is a predictive text method that is based on a dictionary. It is often used on phones to input text on a keyboard with just numeric keys.

  • Trithemius Ave Maria

Is a steganographic technique that replaces each letter of the plaintext by a group of words that look like a poem.

  • Wabun code

This is a type of a morse code that is used to transmit Japanese text.

  • Wolseley cipher

This is a reversible encryption that uses a key and a two line table, the first being the inverse of the first so as to generate a complete substitution table.

A list of Classical ciphers

It works by writing text in a zig-zag format. It’s then read from left to the right side.

This uses the plaintext of the message as the key for the encryption.

This is very similar to vigenere cipher. It subtracts the plaintext to the key.

  • Porta cipher

It changes every letter of the alphabet with another letter.

It’s very similar to affine cipher. It uses a matrix for the gradient.

  • Trifid cipher

This uses a triliteral alphabet that replaces letters by triples of 3 letters, for example A, B and C.

A list of Polygraphic Substitution ciphers

  • Collon cipher

This encryption scheme uses a grid and converts letters into bi-grams.

  • Digrafid cipher

This encryption system uses two grids of letters and transpositions of their coordinates.

It uses 45 by 5 grids that are combined with 2 to 2 to extract letters.

  • Morbit cipher

It’s very similar to morse fractioned code. It uses a key that generates a numeric encryption alphabet.

It’s a symmetrical encryption scheme that was created by Charles Weatstone in 1854.

It’s based on morse code. It works by replacing the dashes , dots and spaces by alphabetic characters.

  • Three square cipher

This one uses three 5 by 5 grids to combine and extract letters with randomness.

It’s also commonly known as double playfair. It uses two keys and 5 by 5 square grids for the encryption process.

A list of Modern ciphers

  • Asymmetric key algorithms

This encryption makes use of two keys. A private key and a public key. The public key is used for encryption, while the private key is used for decryption process.

Asymmetric key ciphers: Diffie-Hellman algorithm, RSA, and DSA.

Block encryption algorithms work by encrypting a fixed size of data(number of bits) commonly called a block. Blocks can be of the following sizes: 64 bits, 128 bits and 256 bits.

Block ciphers: DES (Lucifer), 3DES, AES (Rijndael), IDEA, Serpent, RC5, Kuznyechik, CAST5, Blowfish, Twofish, and Skipjack.

Stream encryption algorithms encrypts one bit or byte of data at a time. They use an infinite stream of pseudorandom bits as the key.

Stream ciphers: RC4, A5/1, A5/2, Chameleon, FISH, Helix, ISSAC, MUGI, WAKE, Pike, SEAL, Panama, SOBER, SOBER-128, and Phelix.

Are you interested in learning how to break codes?

The Elementary Cryptanalysis – A Mathematical Approach book by Abraham Sinkov is what I would recommend.

Now I want to hear from you.

What do you think of this list?

Or maybe I missed one of your favorite cipher.

Either way, let me know by leaving a comment below.


Please enter your comment!
Please enter your name here