5 interesting encryption systems

Father

Professional
Messages
2,602
Reaction score
805
Points
113
How did you hide words before?
A peculiar method of transmitting a secret letter existed during the reign of the dynasty of the Egyptian pharaohs:
chose a slave. They shaved his head bald and painted the text of the message on it with waterproof vegetable paint. When the hair grew back, he was sent to the addressee.
A cipher is any system for transforming text with a secret (key) to ensure the secrecy of the transmitted information.

All cryptography has systems
1. Acrostic is a meaningful text (word, phrase or sentence) composed of the initial letters of each line of the poem.
For example, here is a riddle poem with a clue in the first letters:

D ovolno name known I was his;
P avno swears rogue and perfect them,
I tehoy in disasters happen all Bole,
F ife sweeter when me and the best share.
B lazhenstvu pure souls can serve as one,
And among the wicked - not I created.
Yuri Neledinsky-Meletsky
Sergei Yesenin, Anna Akhmatova, Valentin Zagoryansky often used acrostics.

2. Litorea is a kind of encrypted writing used in ancient Russian manuscript literature. Sometimes simple and wise. The simple one is called gibberish, it consists in the following: putting consonants in two rows in the order.

Use upper letters in writing instead of lower ones and vice versa, and the vowels remain unchanged; so, for example, toquepot = kitten , etc.

Wise litorrhea suggests more complex substitution rules.

3. Is "ROT1" a cipher for kids?
You may have used it as a child. The key to the cipher is very simple: each letter of the alphabet is replaced by the next letter.

A is replaced by B, B is replaced by C, and so on. "ROT1" literally means "rotate 1 letter forward alphabetically." The phrase "I love borscht" will turn into a secret phrase "A miavmya vps" . This cipher is for fun and is easy to understand and decrypt, even if the key is used in the opposite direction.

4. From permutation of terms.
During World War I, confidential messages were sent using so-called transposition fonts. In them, the letters are rearranged using some predefined rules or keys.

For example, words can be written in the opposite direction, so that the phrase "mama soaped the frame" becomes the phrase "amam alym umar". The other permutation key is to permute each pair of letters so that the previous message becomes "am am y al ar um".

It might seem that complex permutation rules can make these ciphers very difficult. However, many encrypted messages can be decrypted using anagrams or modern computer algorithms.

5. Shifting Caesar cipher
It consists of 33 different ciphers, one for each letter of the alphabet (the number of ciphers varies depending on the alphabet of the language used). The person had to know which Julius Caesar cipher to use in order to decrypt the message. For example, if the cipher E is used, then A becomes E, B becomes F, C becomes Z, and so on alphabetically. If the Y cipher is used, then A becomes Y, B becomes I, C becomes A, and so on. This algorithm is the basis for many more complex ciphers, but by itself does not provide reliable protection of the secrecy of messages, since verification of 33 different cipher keys will take relatively little time.

Now that you've read the article, you can probably guess three simple ciphers.

Try to decode:
1) Schsucegto
2) Ls but not uk sv not da eo ol
3) Tspsspshba rpdpeb
 
Top