

Includes two common pigpen ciphers and the Sherlock Holmes' Dancing Men cipher.Ī double columnar transposition cipher that uses the same key, but adds a number of pad characters. Substitute your plaintext letters with other letters, images, or codes. To decode this, you count N characters, write down the letter, count forward N characters, write down the letter, etc. This acts as though you are writing the letters in a rectangular grid and then rotating the grid to the left or right 90°. You can do it with the cryptogram solver also, if you make A=N, B=O, C=P, etc.

It was quite popular on bulletin board systems and Usenet newsgroups. You swap letters A becomes N, and N becomes A. It is fairly strong for a pencil and paper style code.Ī mildly complicated one where you align letters on different rows and then squish the letters together in order to create your ciphertext.Ī popular method of hiding text so that only people who actually take the time to decode it can actually read it. This cipher uses pairs of letters and a 5x5 grid to encode a message. A simple replacment method that is usually the first one taught to children and is still an effective way to obscure your message.Ī virtually uncrackable cipher that relies heavily upon a random source for an encryption key. Replace each letter with the number of its position in the alphabet. Once used to transmit messages around the world, this system can still be used in certain situations to send messages effectively when alternate mediums are not available. The exact same thing as a Vigenere cipher, but it uses numbers instead of a key word. This helps you solve simple ciphers the methods where you replace letter X with letter Y. A simple cypher, but one that is featured on the Kryptos sculpture at the CIA headquarters.īecause two is better than one. Write a message as a long column and then swap around the columns. Similar to a Caesar cipher, but you first alter the encoded alphabet with a word or phrase. Again, you can do it with the cryptogram solver, but you can scroll through values of N pretty easily with this tool. Where ROT13 was based on you adding 13 to the letters, a Caesar cipher lets you add an arbitrary value. An easy and fairly secure pencil & paper cipher. This is typically used to make binary data safe to transport as strictly text.īreaks information for each letter up and spreads it out in the encoded message. Used to hide a message within another message, by using different typefaces or other distinguishing characteristics. Similar to a Caesarian shift, but also adds in a multiplier to further scramble letters.Ī very simplistic cipher where you change A into Z, B into Y, and so on. If you know of another cipher that you think should be on here, leave me This is a pageĭedicated to simple text manipulation tools, which all can be replicated with To be decrypted by hand, you should use a simpler tool. If the message isn't that important or if it is intended Let's say that you need to send your friend a message, but you don't wantĪnother person to know what it is.
