Caesar Cipher
Shift plaintext letters by a fixed number of positions.
Open toolHistoric substitution methods and hand ciphers.
Shift plaintext letters by a fixed number of positions.
Open toolPolyalphabetic substitution cipher using a repeating key.
Open toolUse a repeating keyword with the reciprocal Beaufort rule C = K - P mod 26.
Open toolExtend a keyword with plaintext letters for a stronger polyalphabetic stream.
Open toolEncode letters as row-and-column coordinates using the classic 5x5 Polybius square.
Open toolEncrypt text with E(x) = (ax + b) mod 26 using configurable keys and formatting options.
Open toolEncrypt letter blocks with square key matrices and modular arithmetic.
Open toolEncrypt letter pairs with a 5×5 keyword square and digraph rules.
Open toolBuild a keyed substitution alphabet from a cleaned keyword.
Open toolMix Polybius square coordinates in fixed-size blocks to create a fractionating classical cipher.
Open toolUse a keyed ADFGX square followed by keyed columnar transposition.
Open toolUse a keyed ADFGVX square with letters and digits, then apply keyed columnar transposition.
Open toolWhy the world's easiest cipher to break is still the perfect place to start learning.
How one of the oldest substitution ciphers turns A into Z, B into Y, and the alphabet into its own reflection.
How Lester S. Hill's 1929 matrix cipher moved secret writing beyond alphabet tricks and toward the logic of modern cryptography.
How a repeating keyword lets classical cryptography rotate among several alphabets instead of relying on one fixed substitution.
The World War I field ciphers that split characters into coordinates, scattered those coordinates across the page, and made intercepted radio traffic far harder to analyse at speed.