- Monoalphabetic
- Caesar Cipher
- Atbash Cipher
- Keyword Cipher
- Pigpen / Masonic Cipher
- Polybius Square
- Polyalphabetic
- Vigenère Cipher
- Beaufort Cipher
- Autokey Cipher
- Running Key Cipher
- Polygraphic
- Playfair Cipher
- Bifid Cipher
- Trifid Cipher
- Four-square cipher
- Transposition
- Rail Fence
- Route Cipher
- Columnar Transposition
- Miscellaneous
- Book Cipher
- Beale Cipher
- Morse Code
- Tap Code
- One-time Pad
- Scytale
- Semaphore
- ASCII Code
- Steganography
- Techniques
- Frequency Analysis
- Books
Codes and Ciphers
Codes and Ciphers
- Monoalphabetic
- Caesar Cipher
- Atbash Cipher
- Keyword Cipher
- Pigpen / Masonic Cipher
- Polybius Square
- Polyalphabetic
- Vigenère Cipher
- Beaufort Cipher
- Autokey Cipher
- Running Key Cipher
- Polygraphic
- Playfair Cipher
- Bifid Cipher
- Trifid Cipher
- Four-square cipher
- Transposition
- Rail Fence
- Route Cipher
- Columnar Transposition
- Miscellaneous
- Book Cipher
- Beale Cipher
- Morse Code
- Tap Code
- One-time Pad
- Scytale
- Semaphore
- ASCII Code
- Steganography
- Techniques
- Frequency Analysis
- Books
- Monoalphabetic
- Caesar Cipher
- Atbash Cipher
- Keyword Cipher
- Pigpen / Masonic Cipher
- Polybius Square
- Polyalphabetic
- Vigenère Cipher
- Beaufort Cipher
- Autokey Cipher
- Running Key Cipher
- Polygraphic
- Playfair Cipher
- Bifid Cipher
- Trifid Cipher
- Four-square cipher
- Transposition
- Rail Fence
- Route Cipher
- Columnar Transposition
- Miscellaneous
- Book Cipher
- Beale Cipher
- Morse Code
- Tap Code
- One-time Pad
- Scytale
- Semaphore
- ASCII Code
- Steganography
- Techniques
- Frequency Analysis
- Books
Substitution Ciphers
A substitution cipher is one in which parts of the plaintext are substituted for something else according to the rules of the cipher. The secret message is deciphered using the inverse substitution.
A monoalphabetic cipher uses the same substitution across the entire message. For example, if you know that the letter A is enciphered as the letter K, this will hold true for the entire message. These types of messages can be cracked by using frequency analysis, educated guesses and trial and error.
Polyalphabetic Ciphers
In a polyalphabetic cipher, the substitution may change throughout the message. In other words, the letter A may be encoded as the letter K for part of the message, but latter on it might be encoded as the letter W.
Polygraphic Ciphers
Instead of substituting one letter for another letter, a polygraphic cipher performs substitutions with two or more groups of letters. This has the advantage of masking the frequency distribution of letters, which makes frequency analysis attackes much more difficult.
Follow Braingle!