You are on page 1of 21

Ibinubulgar ko na po ang bumubuhay sakin��

CIPHERS & CODES

CRYPTOGRAPHY

CIPHER LIST

✔ASCII

Type: Substitution

✅Binary

A-01000001 B-01000010 C-01000011 D-01000100 E-01000101 F-01000110 G-01000111 H-01001000 I-


01001001 J-01001010 K-01001011 L-01001100 M-01001101 N-01001110 O-01001111 P-01010000 Q-
01010001 R-01010010 S-01010011 T-01010100 U-01010101 V-01010110 W-01010111 X-01011000 Y-
01011001 Z-01011010 a-01100001 b-01100010 c-01100011 d-01100100 e-01100101 f-01100110 g-
01100111 h-01101000 i-01101001 j-01101010 k-01101011 l-01101100 m-01101101 n-01101110 o-
01101111 p-01110000 q-01110001 r-01110010 s-01110011 t-01110100 u-01110101 v-01110110 w-
01110111 x-01111000 y-01111001 z-01111010 'space'-00100000

✅Decimal

A-65 B-66 C-67 D-68

E-69 F-70 G-71 H-72

I-73 J-74 K-75 L-76

M-77 N-78 O-79 P-80

Q-81 R-82 S-83 T-84

U-85 V-86 W-87 X-88

Y-89 Z-90 a-97 b-98

c-99 d-100 e-101 f-102

g-103 h-104 i-105 j-106

k-107 l-108 m-109 n-110

o-111 p-112 q-113 r-114

s-115 t-116 u-117 v-118


w-119 x-120 y-121 z-122

✅Hexadecimal

A-41 B-42 C-43 D-44

E-45 F-46 G-47 H-48

I-49 J-4A K-4B L-4C

M-4D N-4E O-4F P-50

Q-51 R-52 S-53 T-54

U-55 V-56 W-57 X-58

Y-59 Z-5A a-61 b-62

c-63 d-64 e-65 f-66

g-67 h-68 i-69 j-6A

k-6B l-6C m-6D n-6E

o-6F p-70 q-71 r-72

s-73 t-74 u-75 v-76

w-77 x-78 y-79 z-7A

✅Octal

A-101 B-102 C-103 D-104

E-105 F-106 G-107 H-110

I-111 J-112 K-113 L-114

M-115 N-116 O-117 P-120

Q-121 R-122 S-123 T-124

U-125 V-126 W-127 X-130

Y-131 Z-132 a-141 b-142

c-143 d-144 e-145 f-146

g-147 h-150 i-151 j-152


k-153 l-154 m-155 n-156

o-157 p-160 q-161 r-162

s-163 t-164 u-165 v-166

w-167 x-170 y-171 z-172

✔LATIN CODE

Type: Numbers

> latin alphabet consist of 26 letters. A position in the alphabet is assigned to each letter. The 1 position
for example is assigned to letter a.

A=01 N=14

B=02 O=15

C=03 P=16

D=04 Q=17

E=05 R=18

F=06 S=19

G=07 T=20

H=08 U=21

I =09 V=A

J=10 W=23

K=11 X=24

L=12 Y=25

M=13 Z=26

✔ATBASH

Type: Substitution

> atbash is a type of substitution cipher in which the first letter (a) is substituted to the last letter (z),
second letter(b) is substituted to penultimate (y), and so on.

A=Z
B=Y

C=X

D=W

E=V

F=U

G=T

H=S

I=R

J=Q

K=P

L=O

M=N

✔CEASAR SHIFT / GRONSFELD CIPHER

Type: Substitution

> ceasar cipher or gronsfeld cipher is a type of encryption to which associated a shift of a fixed number
of a letter (towards left or right). Each letter is then relaced by that obtained after performing the shift.

(Note: encoding or decoding depends on the number of shift)

Encrypt-shift forward

Decrypt-shift backward

Example:

Shift: 3

1.)LOVE

encrypted=ORYH

decrypted=ILSB

2.) JUHDW

encrypted=MXKGZ
decrypted=GREAT

✔CAESAR'S BOX

Example:

HBDY-AIAO-PRYU-PTT-YHO

(Note: arrange it like stack and read by column from top to bottom)

Stack form:

HBDY

AIAO

PRYU

PTT

YHO

Answer = HAPPY BIRTHDAY TO YOU

✔VANITY CODE

Type: Substitution

Keypad keys:

1=.,

2=abc

3=def

4=ghi

5=jkl

6=mno

7=pqrs

8=tuv

9=wxyz

0=space
Example:

356937 = flower

6676464 = morning

✔MORSE CODE

Type: Trasposition

> morse code is a system to encode thanks to short and long impulses. Each letter or punctuation mark is
associated with a sequence of signals. These signals are translated to the following characters:

✅Dot(.) is the elementary pulse

✅Comma(,) represents pulse three times longer than the point

✅Space( ) represent separation between two letters

✅Vergule(/) represents separation between words

A= .-

B= -...

C= -.-.

D= -..

E= .

F= ..-.

G= --.

Η= ....

I= ..

J= .---

K= -.-

L= .-..

M= --

N= -.

O= ---
P= .--.

Q= --.-

R= .-.

S= ...

T= -

U= ..-

V= ...-

W= .--

X= -..-

Y= -.--

Z= --..

Example:

-.-. --- -. -.. .. - .. --- -. = CONDITION

✔KEYWORD CIPHER

Type: Substitution

(Note: encoding or decoding is based on the keyword input)

(Note: keyword given will be inserted as first in the sequence of alphabet and letters should never
repeat)

Example

Keyword: GOD

A=G N=M

B=O O=N

C=D P=P

D=A Q=Q

E=B R=R

F=C S=S
G=E T=T

H=F U=U

I=H V=V

J=I W=W

K=J X=X

L=K Y=Y

M=L Z=Z

Cipher: JMNW = KNOW

✔ROT 13

> ROT13 ("rotate by 13 places", sometimes hyphenated ROT-13) is a simple letter substitution cipher that
replaces a letter with the letter 13 letters after it in the alphabet.

Type:

A=Z

B=Y

C=X

D=W

E=V

F=U

G=T

H=S

I=R

J=Q

K=P

L=O

M=N

✔BACON CIPHER
Type: Substitution

> To encode a message, each letter of the plaintext is replaced by a group of five of the letters 'A' or 'B'.
This replacement is a binary encoding and is done according to the alphabet of the Baconian cipher.

A=AAAAA B=AAAAB C=AAABA D=AAABB E=AABAA F=AABAB G=AABBA H=AABBB I/J=ABAAA

K=ABABA L=ABABB M=ABBAA

N=ABBAB O=ABBBA P=ABBBB

Q=BAAAA R=BAAAB S=BAABA T=BAABB U/V=BABAA W=BABBA X=BABBB Y=BBAAA Z=BBAAB

✔REVERSE CIPHER

Types: Words

> two modes are available in this code. First reverses the whole text, second reverses letters word by
word.

Example:

1st mode

1.) NEGYXO = OXYGEN

2.) YRANOITCID = DICTIONARY

3.)1ST: REKEES NOITNETTA = ATTENTION SEEKER

4.)2nd: NOITNETTA REKEE

d: NOITNETTA REKEES = ATTENTION SEEKER

✔PLAYFAIR

Type: Substitution

> playfair cipher uses an array of 5x5 containing a keyword or phrase. The first step is to create a grid
based on the key. The second step is to encrypt the letters of the message by selecting them in pairs.

Key: melons

(Note: grid size is 5x5 and i/j can interchange)

M|E|L|O|N

S|A|B|C|D

F|G|H|I |K
P|Q|R|T|U

V|W|X|Y|Z

Plaintext: VALENTINES

VA LE NT IN ES

Ciphertext: WSOLOUJOMA

WS OL OU JO MA

✔SCYTALE CIPHER

Type: Transposition

> Suppose the rod allows one to write four letters around in a circle and five letters down the side of it.
To decrypt, all one must do is wrap the leather strip around the rod and read across.

(Note: make a table and insert there your input, table is based on diameter)

Example message:

Plaintext: Hey i was doing just fine before i met you

Diameter: 7

H|E|Y| I|W|A|S

D|O| I|N|G|J|U

S|T|F| I|N|E|B

E|F|O|R|E| I|M

E|T|Y|O|U|

Ciphertext: HDSEEEOTFTYIFOYINIROWGNEUAJEISUBM

✔ROTATION CODE

Type: Substitution

(Note: it's formula forencryption is f(x)=(ax)mod26 and for decryption is f(y)=a^-1(y)mod26, where x or y
corresponds to the position of the letter in the alphabet, e.g. a=0, b=1, c=2.....z=25, mod26 correspond
to the limit of the rotation, and a correspond to any input number)

Example: (encryption)

Plaintext: KING
F(x)=(ax)mod26

a=2

K=10, f(x)=(2*10)mod26=20

�I =8, f(x)=(2*8)mod26=16

N=13, f(x)=(2*13)mod26=26

G=6, f(x)=(2*6)mod26=12

K=20=U

I =16=Q

N=26=A

G=12=M

Ciphertext: UQAM

Example: (decryption)

Ciphertext: UQAM

F(y)=a^-1(y)mod26

a=2

U=20, f(y)=2^-1(20)mod26=10

Q=16, f(y)=2^-1(16)mod26=8

A=26, f(y)=2^-1(26)mod26=13

M=12, f(y)=2^-1(12)mod26=6

U=10=K

Q=8=I

A=13=N

M=6=G

Plaintext: KING

(Note: mod26, when no>25, then it will rotate back to 0, 26=0, 27=1, 28=2 and so on, where a=0 and
z=25, e.g. 30=e)
✔AFFINE CIPHER

Type: Substitution

(Note: it's formula for encryption is f(x)=(ax+b)mod n, and for decryption is f(y)=a^-1(y-b)mod n, where
"a" should be coprime of "n", "x" or "y" corresponds on the position of the letter in the alphabet (see
rotation code), and "b" is any value of input, and mod n is the limit of rotation)

Example: (encryption)

Plaintext: AFFINE

a=5, b=8, n=26

F(x)=(ax+b)mod26

A=0, F(0)=(5(0)+8)mod26=8

F=5, F(5)=(5(5)+8)mod26=33

F=5, F(5)=(5(5)+8)mod26=33

I =8, F(8)=(5(8)+8)mod26=48

N=13, F(13)=(5(13)+8)mod26=73

E=4, F(4)=(5(4)+8)mod26=28

A=08=I

F=33=H

F=33=H

I =48=W

N=73=V

E=28=C

Ciphertext: IHHWVC

Example: (decryption)

Ciphertext: IHHWVC

a=5, b=8, n=26

F(y)=a^-1(y-b)mod n
I =08, f(8)=5^-1(8-8)mod26=0

H=33, f(33)=5^-1(33-8)mod26=5

H=33, f(33)=5^-1(33-8)mod26=5

W=48, f(48)=5^-1(48-8)mod26=8

V=73, f(73)=5^-1(73-8)mod26=13

C=28, f(28)=5^-1(28-8)mod26=4

I =0=A

H=5=F

H=5=F

W=8=I

V=13=N

C=5=E

Plaintext: AFFINE

✔RAIL FENCE CIPHER

Type: Transposition

(Note: shift depends on no. key or rails, and letters should be written downward and diagonally, let `=no.
of shift or rails)

Plaintext: HEY I JUST MET YOU AND THIS IS CRAZY

shift: 3

h```j```m```o```d```s```r```

`e`i`u`t`e`y`u`n`t`i`i`c`a`y

``y```s```t```a```h```s```z`

Ciphertext:

HJMODSREIUTEYUNTIICAYYSTAHSZ

✔POLYBIUS SQUARE

Type: Numbers
> Polybius square, also known as the Polybius checkerboard, is a device invented by the Ancient
Greekhistorian and scholar Polybius, for fractionating plaintext characters so that they can be
represented by a smaller set of symbols.

(Note: create a table of any size, readings should start in column then row)

Example:5x5

⭐A B C D E

A|A|B|C|D|E

B|F|G|H|J|K

C|L|M|N|O|P

D|Q|R|S|T|U

E|V|W|X|Y|Z

Ciphertext: CB CD CC BD AA ED

Plaintext: M O N D A Y

✔VIGENERE CIPHER

Type: Substitution

(Note: keywords sets at the starting point of alphabet and keyword shoud be inserted in the first column
of the table mot in the row, keyword shoud be repeated until it reach the same value or no. of the text )

Example:

Plaintext: JUPITER

Keyword: mapsmap

(See vigenere table)

Ciphertext: VUEAFEG

✔HITMAN CIPHER

If A is A then N is N.

A~A

B~Z

C~Y
D~X

E~W

F~V

G~U

H~T

I~S

J~R

K~Q

L~P

M~O

N~N

Example

Ciphertext: TSHOAN

Plaintext: HITMAN

✔BIFID CIPHER

Type: Substitution

CIPHER: First column and firs row contains numbers while the rest is letters)

Example: 5x5

✴1 2 3 4 5

1|A|B|C|D|E|

2|F|G|H| I |K|

3|L|M|N|O|P|

4|Q|R|S|T|U|

5|V|W|X|Y|Z|

Ciphertext: 3,2 3,4 3,3 4,3 4,4 1,5 4,2 or


Ciphertext: 32 34 33 43 44 15 42

Plaintext: MONSTER

✔TAP CODE

A(. .) B(. ..)

C(. ...) D(. ....)

E (. .....) F (.. .)

G(.. ..) H(.. ...)

I(.. ....) J(.. .....)

K(. ...) L(... .)

M(... ..) N(... ...)

O(... ....) P(... .....)

Q(.... .) R(.... ..)

S(.... ...) T(.... ....)

U(.... .....) V(..... .)

W(..... ..) X(..... ...)

Y(..... ....) Z(..... .....)

*space* (null)

✔CLOCK CODES

(Exponents = Arithmetic Modula)

A~� B~� C~� D~� E~� F~� G~�H~�I~� J~� K~� L~� M~�² N~�² O~�² P~�² Q~�² R~�²
S~�² T~�² U~�² V~�² W~�² X~�² Y~�³ Z~�³

DOT DOT CODES

A(°••••)

B(•°•••)

C(••°••)

D(•••°•)
E(••••°)

F(•°°°°)

G(°•°°°)

H(°°•°°)

I(°°°•°)

J(°°°°•)

K(°•°•°)

L(•°•°•)

M(••°°°°)

N(°°••°°)

O(°°°°••)

P(°°••••)

Q(••°°••)

R(••••°°)

S(•°•°°)

T(°•°°•)

U(•°°•°)

V(°°•°•)

W(°•°••)

X(•°••°)

Y(°••°•)

Z(••°•°)

✔NEWS CIPHER

(Note: make a table of letters, whether theres a keyword or none, 5x5 from A to Z, where C/K and I/J are
interchangeable.)

Legends:
N ~ North

E ~ East

W ~ West

S ~ South

NE ~ North East

NW ~ North West

SE ~ South East

SW ~ South West

A|B|C|D|E

F|G|H|I|J

L | M| N | O | P

Q|R|S|T|U

V | W| X | Y | Z

Example:

Ciphertext: NWFNVNEDSBWISWFN

N(W) F(N) V(NE) D(S) B(W) I(SW) F(N)

Plaintext: MARIANA

✔CROSS CODE

A ~ †††

B ~ +††

C ~ †+†

D ~ ††+

E ~ †++

F ~ +†+

G ~ ++†
H ~ ࠠ

I ~ †‡†

J ~ ††‡

K ~ ‡++

L ~ +‡+

M ~ ++‡

N ~ †‡‡

O ~ ‡†‡

P ~ ‡‡†

Q ~ +‡‡

R ~ ‡+‡

S ~ ‡‡+

T ~ ‡†+

U ~ †+‡

V ~ +‡†

W ~ ‡+†

X ~ +†‡

Y ~ †‡+

Z ~ +++

✔ARROW CODES

(Note: Create a table of letters 5x5 either theres a keyword or none, and moves starts after the first given
letter)

Legends: ←↑↓→

Moves: ¹ ² ³ ⁴

/-separates each letters

A|B|C|D|E
F|G|H|I|J

L | M| N | O | P

Q|R|S|T|U

V | W| X | Y | Z

Example:

Codex: P/ ←⁴↑²/ →²↓²/ →¹↑²/ ↓²/ ←²↓¹/ ←¹↑³/

Plaintext: PANDORA

✔PIGPEN and TEMPLAR CIPHER

(See pigpen image)

(See templar image <•)

> the pigpen and templar cipher is a geometric simple substitution cipher, which exchanges letters for
sybols which are fragments of grid.

Binary codes symbols

00100001 = !

00100010 = "

00100011 = #

00100100 = $

00100101 = %

00100110 = &

00100111 = '

00101000 = (

00101001 = )

00101010 = *

00101011 = +

00101100 = ,

00101101 =
00101110 = .

00101111 = /

00111111 = ?

01000000 = @

NUMBERS:

00110000 = 0

00110001 = 1

00110010 = 2

00110011 = 3

00110100 = 4

00110101 = 5

00110110 = 6

00110111 = 7

00111000 = 8

00111001 = 9

P.s ito na yung mga code!!!!

P.p.s sa inyo nalang wott! �

You might also like