Purdue University Caesar Ciphers
Online Vigenere Cipher encoding
These classic ciphers are certainly not secure for modern communications. However, they provide an excellent place to start learning cryptography.
ATBASH
Hebrew scribes copying the book of Jeremiah used this cipher. It is very
simple, just reverse the alphabet.
This is, by modern standards, a very primitive and easy to break cipher.
But it will help you get a feel for how cryptography works.
The ATBASH cipher is a Hebrew code which substitutes the first letter of
the alphabet for the last and the second letter for the second to the
last, etc. It simply reverses the alphabet.
In English this would be A becomes Z, B becomes Y, C becomes X, etc.
Caesar
This cipher was first used by Julius Caesar.
Every letter is shifted a fixed number of spaces to the left or the
right in the alphabet. Caesar purportedly shifted 3 to the right, but
you can apply this with any type of shift you prefer.
The shifting is the ‘key’ for this algorithm
The shift is often called the ‘alphabet’ being used. So the Caesar
Cipher is an example of a single alphabet substitution since all letters
are shifted the same amount.
So if you choose a shift of two the the right
"A CAT" becomes "C ECV"
Rail Cipher
The rail fence cipher may be the most widely known
transposition cipher. You simply take the message you wish to encrypt
and alter each letter on a different row. So “attack at dawn” is written
as:
A
t c
a d
w
t a
k t
a n
Next you write down the text reading from left to
right as one normally would, thus producing:
atcadwtaktan
Most books and courses use the two row rail fence cipher, but there is no reason at all that you cannot use more rows.
Polybius Cipher
The Polybius cipher (also known as the Polybius
square) was invented by the Greek historian Polybius, who lived around
200 to 118 BCE. Obviously his work used the Greek alphabet, but we will
use it with English here
|
1 |
2 |
3 |
4 |
5 |
|
|
1 |
A |
B |
C |
D |
E |
|
2 |
F |
G |
H |
I/J |
K |
|
3 |
L |
M |
N |
O |
P |
|
4 |
Q |
R |
S |
T |
U |
|
5 |
V |
W |
X |
Y |
Z |
Each letter is represented by two numbers. Those two
numbers being the x and y coordinate of that letter on the grid. For
example A is 1 1, D is 1 4, and R is 4 2.
So to write the word attack you would write:
114444111325
This is still a substitution cipher and still
maintains the letter and word frequencies found in the underlying
language of the plain text.
If one uses the standard Polybius square, shown above, then it is a
widely known cipher and would be easily cracked, even without any
frequency analysis. If one
wishes to use a different encoding for letters, that would also require
that the two parties share the Polybius square in advance, so that they
can exchange messages.

The cipher works by first creating a modified Polybius
square. Rather than number coordinates, the letters
A, D, F, G, and X are used (the letter V is not used to create
the modified Polybius square).
|
A |
D |
F |
G |
X |
|
|
A |
B |
T |
A |
L |
P |
|
D |
D |
H |
O |
Z |
K |
|
F |
Q |
F |
V |
S |
N |
|
G |
G |
I/J |
C |
U |
X |
|
X |
M |
R |
E |
W |
Y |
Notice that the letters are not in order in the
Polybius square. This is a common variation to help make the cipher more
secure. The next step is to encrypt the message using this modified
Polybius square. Let us assume the message is “attack at dawn”. As with
the traditional Polybius square, each letter is represented by its
coordinates, in this case by two letters, giving us:
AF AD AD AF GF DX AF AD DA AF XG FX
Next the message is written out under in columns under
some key word. Let us
continue using “falcon” as our keyword
F A
L
C O
N
A F
A D
A D
A F
G F
D X
A F
A D
D A
A F
X G
F X
Now the columns are sorted by alphabetical order of
the keyword. So we have
A
C F
L
N O
F
D A
A D
A
F
F A
G X
D
F D
A A
A D
C
G A
X X
F
Then each column is written down in sequence as the
cipher text. That gives us
FFFC DFDG AAAA AGAX DXAX ADDF
Obviously one can use any size transposition key word
one wishes. In practice, longer keywords were frequently used.
There were several Enigma Models including:
Enigma A, the first public Enigma
Enigma B
Enigma C
Enigma B, used by United Kingdom, Japan, Sweden, and
others
Navy Cipher D, used by the Italian Navy.
Funkschlüssel C, used by the German navy beginning in
1926
Enigma G, used by the German Army.
Wehrmacht Enigma I, a modification to the Enigma G.
Used extensively by the German Military
M3, an improved Enigma introduced in 1930 for the
German military.
There have been systems either derived from Enigma, or
similar in concept. These include the Japanese system codenamed GREEN by
American cryptographers, the SIGABA system, NEMA, and others.

SIGABA