pigpen cipher

What is Pigpen Cipher (with Example)

Pigpen cipher is a simple substitution cipher that works by replacing each letter of the message with a symbol. In pigpen cipher, each letter...
double transposition cipher

What is Transposition Cipher (with Example)

Transposition cipher encrypts by switching the order of the letters to conceal the message being sent. This is completely opposite to how simple substitution ciphers...
polybius square

What is Polybius Square Cipher (with Example)

Polybius square is a monoalphabetic substitution cipher. Polybius cipher (or Polybius square) works by replacing each letter by the coordinates of its position in a...
playfair cipher

What is Playfair Cipher (with Example)

A Playfair cipher is a digraph substitution cipher that uses a table where one letter of the alphabet is omitted, and the letters are...
crypto quotes

117 Great Quotes On Bitcoin, Cryptocurrencies and Cryptography

Sometimes when I want to feel inspired I read some of these cryptography quotes and they always make me feel good when things are...

How to Become a Cryptographer: A Step-by-Step Guide

Have you been wondering who a cryptographer is and how you can become one? Today I will just do that. I will be exploring...
vigenere cipher

What is Vigenère Cipher (with Example)

Vigenère cipher is a polyalphabetic substitution cipher that uses a keyword to do multiple alphabetic shifts on the plaintext. The encryption of the plaintext...
caesar cipher

What is Caesar Cipher (with Example)

Are you looking for a simple method to encrypt simple messages between your friends? Then, Caesar cipher is all you need. It is considered...
cryptography terms

44 Essential Cryptography Terms You Should Know [Glossary]

Do you want to learn encryption but have trouble communicating with the other experts? Jargon alone should not stop you from learning cryptography. This is...
cryptography books

The 42 Best Cryptography Books You Should Read

What are some of the best cryptography books to learn how encryption works? Sometimes it can be hard to find a good book that...
Cryptography

How to Learn Cryptography in 2018 (and Stay Sane)

Cryptography is concerned with keeping our data and information secure. To protect ourselves from such attacks like cyber crimes we need the best encryption...
hash function

What Is A Hash Function and What Can It Be Used For?

A hash function in cryptography refers to a mathematical function that converts a numerical input value into another compress numerical value. The input to...

You May Also Like