Alberti disc

What is Polyalphabetic Cipher (with Example)

A polyalphabetic cipher is any cipher where a given letter of the alphabet is not always encrypted by the same ciphertext letter. To put it...
rail fence cipher

What is Route Cipher (with Example)

Route cipher is a transposition cipher that encrypts the plaintext letters based on the shaped of an imaginary path drawn on a grid. To put...
unknown ciphers

How to Identify the Type of Cipher Used to Encrypt a Message

Sometimes you may find yourself with an unknown cipher that you want to decode. And neither the key nor the algorithm that was used...
vigenere cipher

What is Gronsfeld Cipher (with Example)

Gronsfeld cipher is a polyalphabetic substitution cipher that uses digits as a key, which is used to do multiple alphabetic shifts on the plaintext...
Bacon cipher

What is Bacon Cipher (with Example)

Bacon cipher is a steganographic technique that uses bilateral substitution alphabet which replaces a character with a group of 5 formed with two letters,...
polybius square

What is Bifid Cipher (with Example)

Bifid cipher is a tomographic cipher that uses coordinates of letters and mixes them in order to get new coordinates. Bifid cipher combines the Polybius...
stream cipher

What is Stream Cipher (with Example)

A stream cipher is a method of encrypting text where a cryptographic key and an algorithm are applied to each binary digit in a...
block cipher

What is Block Cipher (with Example)

A block cipher is any method that applies a deterministic algorithm along with a symmetric key to encrypt a block of text, rather than...
hash function

Why are Hashes Irreversible (One Way Encryption)

A cryptographic hash function is a mathematical formula that allows one to convert a given value to another fixed sized value that is irreversible. For...
256-bit encryption

Why is 2^256 Secure (with Example)

How secure is 2^256: There is a 1 in over 115 quattuorvigintillion (that’s a 78 digit number) chance of finding a collision. There is...
monoalphabetic substitution ciphers

What is Monoalphabetic Cipher (with Example)

A monoalphabetic cipher is any cipher in which the letters of the plaintext are mapped to ciphertext letters based on a single alphabet key. Substitution...
cyber security

The 24 Best Cryptography Blogs and Resources to Learn Encryption

Sometime back it was very hard to find any blog, but today it’s virtually impossible to find a good blog because they are so...