### What is Vernam Cipher (with Example)

Vernam cipher is a symmetrical stream cipher in which the plaintext is combined with a random or pseudorandom stream of data of the same...

### What is ADFGVX Cipher (with Example)

ADFGVX cipher is a fractionating transposition cipher that uses 6 by 6 square grid to replace the plaintext by pairs of letters among A,...

### What is Affine Cipher (with Example)

Affine cipher is a monoalphabetic substitution cipher where each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical...

### What is Polyalphabetic Cipher (with Example)

A polyalphabetic cipher is any cipher where a given letter of the alphabet is not always encrypted by the same ciphertext letter. To put it...

### What is Route Cipher (with Example)

Route cipher is a transposition cipher that encrypts the plaintext letters based on the shaped of an imaginary path drawn on a grid. To put...

### How to Identify the Type of Cipher Used to Encrypt a Message

Sometimes you may find yourself with an unknown cipher that you want to decode. And neither the key nor the algorithm that was used...

### What is Gronsfeld Cipher (with Example)

Gronsfeld cipher is a polyalphabetic substitution cipher that uses digits as a key, which is used to do multiple alphabetic shifts on the plaintext...

### What is Bacon Cipher (with Example)

Bacon cipher is a steganographic technique that uses bilateral substitution alphabet which replaces a character with a group of 5 formed with two letters,...

### What is Bifid Cipher (with Example)

Bifid cipher is a tomographic cipher that uses coordinates of letters and mixes them in order to get new coordinates. Bifid cipher combines the Polybius...

### What is Stream Cipher (with Example)

A stream cipher is a method of encrypting text where a cryptographic key and an algorithm are applied to each binary digit in a...

### What is Block Cipher (with Example)

A block cipher is any method that applies a deterministic algorithm along with a symmetric key to encrypt a block of text, rather than...

### Why are Hashes Irreversible (One Way Encryption)

A cryptographic hash function is a mathematical formula that allows one to convert a given value to another fixed sized value that is irreversible. For...