Atbash Cipher - Ancient Encryption Tool
Reference Guide

Cryptography Glossary

A comprehensive reference of 56 cryptography terms covering cipher types, encryption concepts, historical milestones, and technical encoding methods.

Cipher Types

19 terms

Atbash Cipher

An ancient Hebrew substitution cipher that replaces each letter with its reverse counterpart in the alphabet (A becomes Z, B becomes Y, etc.). It is one of the oldest known encryption methods, found in biblical texts.

Caesar Cipher

A substitution cipher that shifts each letter by a fixed number of positions in the alphabet. Named after Julius Caesar, who reportedly used a shift of 3 for military communications.

Vigenere Cipher

A polyalphabetic substitution cipher that uses a keyword to determine different shift values for each letter. It was considered unbreakable for over 300 years until Friedrich Kasiski published a method to crack it in 1863.

ROT13

A special case of the Caesar cipher with a fixed shift of 13. Because the English alphabet has 26 letters, applying ROT13 twice returns the original text, making it its own inverse.

Enigma

An electromechanical rotor cipher machine used by Nazi Germany during World War II. It employed multiple rotors and a plugboard to create complex polyalphabetic substitution, producing approximately 158 quintillion possible settings.

AES (Advanced Encryption Standard)

A symmetric block cipher adopted by the U.S. government as the standard for encrypting classified information. It operates on 128-bit blocks and supports key sizes of 128, 192, and 256 bits.

DES (Data Encryption Standard)

A symmetric block cipher that was the dominant encryption standard from the 1970s until it was superseded by AES. It uses a 56-bit key and operates on 64-bit blocks, now considered insecure due to its short key length.

RSA

An asymmetric encryption algorithm based on the mathematical difficulty of factoring large prime numbers. Named after its inventors Rivest, Shamir, and Adleman, it is widely used for secure data transmission and digital signatures.

Blowfish

A symmetric block cipher designed by Bruce Schneier in 1993 as a fast, free alternative to existing algorithms. It uses variable-length keys from 32 to 448 bits and operates on 64-bit blocks.

Twofish

A symmetric block cipher and one of the five finalists in the AES selection process. Designed as a successor to Blowfish, it uses 128-bit blocks and supports key sizes up to 256 bits.

Playfair Cipher

A digraph substitution cipher that encrypts pairs of letters using a 5x5 grid constructed from a keyword. Invented by Charles Wheatstone in 1854, it was used by British forces in World War I.

Rail Fence Cipher

A transposition cipher that arranges plaintext in a zigzag pattern across a specified number of rails (rows), then reads off each row to produce the ciphertext.

Columnar Transposition

A transposition cipher that writes plaintext into rows of fixed width, then reorders the columns according to a keyword before reading off the columns to produce ciphertext.

Hill Cipher

A polygraphic substitution cipher based on linear algebra that encrypts groups of letters using matrix multiplication. Invented by Lester S. Hill in 1929, it was one of the first ciphers to use mathematics beyond simple arithmetic.

Beaufort Cipher

A reciprocal cipher closely related to the Vigenere cipher. Unlike Vigenere which adds key values, Beaufort subtracts plaintext from the key, making encryption and decryption use the same operation.

Affine Cipher

A monoalphabetic substitution cipher that uses a mathematical function (ax + b mod m) to encrypt each letter. It combines multiplication and addition for a more complex mapping than the Caesar cipher.

Polybius Square

An encoding scheme that represents each letter as a pair of coordinates in a 5x5 grid. Originally created by the Greek historian Polybius for long-distance signaling, it forms the basis of several more complex ciphers.

One-Time Pad

The only mathematically proven unbreakable encryption method. It uses a random key at least as long as the message, with each key used only once. Its impracticality (key distribution and length) limits real-world use.

XOR Cipher

A cipher that applies the exclusive-or (XOR) bitwise operation between plaintext and a key. When used with a truly random key of equal length, it becomes a one-time pad.

Cryptographic Concepts

18 terms

Plaintext

The original, readable message or data before encryption. In cryptography, plaintext is the input to an encryption algorithm and the output of a decryption algorithm.

Ciphertext

The encrypted, unreadable output produced by applying an encryption algorithm to plaintext. Ciphertext can only be converted back to readable plaintext using the correct decryption key or method.

Key

A piece of information (typically a string of numbers or letters) that determines the output of a cryptographic algorithm. The security of encrypted data depends on keeping the key secret, not the algorithm.

Encryption

The process of converting plaintext into ciphertext using a cryptographic algorithm and a key. It ensures that only authorized parties with the correct key can read the original message.

Decryption

The reverse process of encryption that converts ciphertext back into readable plaintext. It requires knowledge of the encryption algorithm and the correct key.

Substitution Cipher

A class of ciphers where each unit of plaintext is replaced with a unit of ciphertext according to a fixed system. The Atbash and Caesar ciphers are classic examples of substitution ciphers.

Transposition Cipher

A class of ciphers that rearranges the positions of plaintext characters without changing the characters themselves. Unlike substitution ciphers, no letters are replaced, only reordered.

Monoalphabetic Cipher

A substitution cipher that uses a single fixed mapping between plaintext and ciphertext letters throughout the entire message. Atbash and Caesar ciphers are monoalphabetic, making them vulnerable to frequency analysis.

Polyalphabetic Cipher

A substitution cipher that uses multiple substitution alphabets, switching between them according to a key. The Vigenere cipher is the most well-known example, offering greater security than monoalphabetic ciphers.

Symmetric Key Cryptography

An encryption system where the same key is used for both encryption and decryption. Both sender and receiver must share the secret key, which presents the key distribution problem.

Asymmetric Key Cryptography

An encryption system using a pair of mathematically related keys: a public key for encryption and a private key for decryption. This solves the key distribution problem of symmetric cryptography.

Hash Function

A one-way mathematical function that converts input data of any size into a fixed-size output (hash value). Used for data integrity verification, password storage, and digital signatures.

Block Cipher

An encryption algorithm that operates on fixed-size groups (blocks) of bits. AES and DES are block ciphers that process data in 128-bit and 64-bit blocks respectively.

Stream Cipher

An encryption algorithm that encrypts data one bit or byte at a time, combining plaintext with a pseudorandom keystream. Faster than block ciphers for real-time applications like wireless communications.

Frequency Analysis

A cryptanalysis technique that exploits the uneven distribution of letters in natural language. By comparing letter frequencies in ciphertext to known language patterns, analysts can break monoalphabetic ciphers.

Brute Force Attack

A cryptanalysis method that systematically tries every possible key until the correct one is found. Its feasibility depends on key length; modern ciphers use keys long enough to make brute force computationally impractical.

Known-Plaintext Attack

A cryptanalysis technique where the attacker has access to both the plaintext and its corresponding ciphertext, using this information to deduce the encryption key or algorithm.

Ciphertext-Only Attack

The most difficult form of cryptanalysis where the attacker only has access to ciphertext and must deduce the plaintext or key without any additional information.

Historical

9 terms

Scytale

An ancient Spartan cipher device consisting of a rod around which a strip of parchment was wound. Messages written along the rod's length became scrambled when unwound, creating one of the earliest known transposition ciphers.

Hieroglyphics

The ancient Egyptian writing system that used pictorial symbols. While not a cipher per se, scribes sometimes used non-standard hieroglyphs to obscure meaning, representing one of the earliest forms of cryptographic thinking.

Rosetta Stone

A granodiorite stele inscribed with a decree in three scripts (hieroglyphic, demotic, and Greek) that enabled the decipherment of Egyptian hieroglyphs. It demonstrates the principle that parallel texts can break unknown codes.

Enigma Machine

A family of electromechanical cipher machines used by Germany in World War II. Its breaking by Polish and British codebreakers (notably at Bletchley Park) is estimated to have shortened the war by two years.

Purple Machine

The Allied codename for the Japanese diplomatic cipher machine used during World War II. It was broken by American cryptanalyst William Friedman's team before Pearl Harbor, providing crucial intelligence.

Zimmermann Telegram

A secret 1917 German diplomatic communication proposing a military alliance with Mexico against the United States. Its decryption by British Room 40 codebreakers helped bring the U.S. into World War I.

Alan Turing

British mathematician and computer scientist who led the effort to break the Enigma cipher at Bletchley Park during WWII. His work laid the theoretical foundations for modern computing and artificial intelligence.

Claude Shannon

American mathematician known as the 'father of information theory.' His 1949 paper 'Communication Theory of Secrecy Systems' established the mathematical foundations of modern cryptography, proving the one-time pad's perfect secrecy.

Technical

10 terms

Base64

A binary-to-text encoding scheme that represents binary data using 64 printable ASCII characters. Commonly used to embed binary data in text-based formats like email (MIME) and JSON web tokens.

Hex Encoding

A method of representing binary data using hexadecimal (base-16) digits (0-9, A-F). Each byte is represented by two hex characters, making it a compact and human-readable binary representation.

ASCII

American Standard Code for Information Interchange, a character encoding standard that assigns numeric values (0-127) to English letters, digits, and symbols. It forms the foundation of most modern character encoding systems.

Unicode

A universal character encoding standard that assigns a unique code point to every character in every writing system. It encompasses over 149,000 characters from 161 scripts, replacing hundreds of incompatible encoding systems.

UTF-8

A variable-width character encoding that can represent every Unicode character. It uses 1 to 4 bytes per character, with ASCII characters using a single byte, making it backward-compatible with ASCII.

MD5

A widely-used hash function that produces a 128-bit (16-byte) hash value, typically expressed as a 32-character hexadecimal string. Now considered cryptographically broken due to collision vulnerabilities, but still used for checksums.

SHA-256

A cryptographic hash function from the SHA-2 family that produces a 256-bit (32-byte) hash value. Used in Bitcoin mining, TLS certificates, and digital signatures, it remains computationally secure against collision attacks.

HMAC

Hash-based Message Authentication Code, a mechanism that combines a cryptographic hash function with a secret key to verify both data integrity and authenticity. Used in TLS, IPsec, and API authentication.

Salt

Random data added to a password before hashing to ensure that identical passwords produce different hash values. Salting prevents rainbow table attacks and makes precomputed dictionary attacks impractical.

Initialization Vector (IV)

A random or pseudo-random value used alongside a key to ensure that encrypting the same plaintext multiple times produces different ciphertexts. Essential for block cipher modes like CBC and CTR.

Try These Ciphers Yourself

Explore our collection of 50+ free online cipher and encoding tools.