Sei sulla pagina 1di 4

CRYTOGRAM

THESE are some common crytograms

Caesar cipher

Cryptogram A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Meaning X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
The Caesar cipher used in Gravity Falls substitutes the original letter for the third
letter before it. In the case for letters X, Y, and Z, one would have to cycle through
to the beginning of the alphabet

Atbash cipher
Cryptogram Z Y X W V U T S R Q P O N M L K J I H G F E D C B A
Meaning A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

tbash ciphers are decoded by reversing the letters. For example, an A turns into a Z.

A1Z26 cipher
ryptogram 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 2
Meaning A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

The A1Z26 cipher is a simple substitution cipher decoded by substituting the nᵗʰ letter of the
alphabet for given number
Vigenère cipher
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y

Caesar shift cipher

In order to decipher Caesar shift cipher A person needs to be told which Caesar cipher the G cipher is
used, then A becomes G, B becomes H, C becomes I, and so on through the alphabet. If the Y cipher is
used, then A becomes Y, B becomes Z, C becomes A, and so on.

MONO ORDER CIPHER


The sentence is broke into alphabets, which then place into 4 columns top to bottom, left to right,

And read form above to bellow , like the following example

Meaning ; this is a confidential message


t h i s
i s a c
o n f i
d e n t
i a l M
e s s a
g e

Cryptogram: Tiodieg hsnease iafnls scitma

The enigma code


The Enigma code, which was a very sophisticated cipher, was used during the Second World War by the
Germans. It involved an Enigma machine, similar to a typewriter, where pressing a letter would make the
cipher letter light up on a screen. The Enigma machine involved several wheels which connected letters
with wires, determining which cipher letter would light up. All Enigma machines were identical, and
knowing the initial configuration of the wheels inside was the key to enciphering messages. To make
things harder, each wheel would rotate after a certain number of letters were typed, so the cipher was
continuously changing within a message. German commanders had Enigma machines and would be issued
lists of the initial wheel configuration to use for each day so that all the Germans used the same one and
could decipher each other’s messages. Even when the Allies procured a copy of the Enigma machine they
could not decipher anything, as there were over one hundred trillion possible wheel configurations to
check. The Enigma code was broken by Polish ingenuity and perfected by the British using geniuses and
computers. Knowledge of the German communications gave the Allies a vital advantage in the War, and

from breaking the Enigma code, the ancestor of modern computers was born .
For more cryptography
Go to https://www.exploratorium.edu/ronh/secret/secret.html
go to http://www.braingle.com/brainteasers/codes/
go to http://practicalcryptography.com/ciphers/simple-
substitution-cipher/

credits: http://gravityfalls.wikia.com/wiki/List_of_cryptograms
http://listverse.com/2012/03/13/10-codes-and-ciphers/

Potrebbero piacerti anche