Cryptography 2: How to?

1.4K 29 5
                                    


☑BIFID CIPHER
Type: Substitution
CIPHER: First column and firs row contains numbers while the rest is letters)
Example: 5x5
✴1 2 3 4 5
1|A|B|C|D|E|
2|F|G|H| I |K|
3|L|M|N|O|P|
4|Q|R|S|T|U|
5|V|W|X|Y|Z|
Ciphertext: 3,2 3,4 3,3 4,3 4,4 1,5 4,2 or
Ciphertext: 32 34 33 43 44 15 42
Plaintext: MONSTER

☑TAP CODE
A(. .) B(. ..)
C(. ...) D(. ....)
E (. .....) F (.. .)
G(.. ..) H(.. ...)
I(.. ....) J(.. .....)
K(. ...) L(... .)
M(... ..) N(... ...)
O(... ....) P(... .....)
Q(.... .) R(.... ..)
S(.... ...) T(.... ....)
U(.... .....) V(..... .)
W(..... ..) X(..... ...)
Y(..... ....) Z(..... .....)
*space* (null)

☑CLOCK CODES
(Exponents = Arithmetic Modula)
A~🕐 B~🕑 C~🕒 D~🕓 E~🕔 F~🕕 G~🕖 H~🕗 I~🕘 J~🕙 K~🕚 L~🕛 M~🕐² N~🕑² O~🕒² P~🕓² Q~🕔² R~🕕² S~🕖² T~🕗² U~🕘² V~🕙² W~🕚² X~🕛² Y~🕐³ Z~🕑³

☑DOT DOT CODES
A(°••••)
B(•°•••)
C(••°••)
D(•••°•)
E(••••°)
F(•°°°°)
G(°•°°°)
H(°°•°°)
I(°°°•°)
J(°°°°•)
K(°•°•°)
L(•°•°•)
M(••°°°°)
N(°°••°°)
O(°°°°••)
P(°°••••)
Q(••°°••)
R(••••°°)
S(•°•°°)
T(°•°°•)
U(•°°•°)
V(°°•°•)
W(°•°••)
X(•°••°)
Y(°••°•)
Z(••°•°)

☑NEWS CIPHER
(Note: make a table of letters, whether theres a keyword or none, 5x5 from A to Z, where C/K and I/J are interchangeable.)
Legends:
N ~ North
E ~ East
W ~ West
S ~ South
NE ~ North East
NW ~ North West
SE ~ South East
SW ~ South West
A | B | C | D | E
F | G | H | I | J
L | M| N | O | P
Q | R | S | T | U
V | W| X | Y | Z
Example:
Ciphertext: NWFNVNEDSBWISWFN
N(W) F(N) V(NE) D(S) B(W) I(SW) F(N)
Plaintext: MARIANA

☑CROSS CODE
A ~ †††
B ~ +††
C ~ †+†
D ~ ††+
E ~ †++
F ~ +†+
G ~ ++†
H ~ ࠠ
I ~ †‡†
J ~ ††‡
K ~ ‡++
L ~ +‡+
M ~ ++‡
N ~ †‡‡
O ~ ‡†‡
P ~ ‡‡†
Q ~ +‡‡
R ~ ‡+‡
S ~ ‡‡+
T ~ ‡†+
U ~ †+‡
V ~ +‡†
W ~ ‡+†
X ~ +†‡
Y ~ †‡+
Z ~ +++

☑ARROW CODES
(Note: Create a table of letters 5x5 either theres a keyword or none, and moves starts after the first given letter)
Legends: ←↑↓→
Moves: ¹ ² ³ ⁴
/-separates each letters
A | B | C | D | E
F | G | H | I | J
L | M| N | O | P
Q | R | S | T | U
V | W| X | Y | Z
Example:
Codex: P/ ←⁴↑²/ →²↓²/ →¹↑²/ ↓²/ ←²↓¹/ ←¹↑³/
Plaintext: PANDORA

☑PYCALI CODE
➡ Atbash + Keyword Substitution + Vigenere + Porta

☑PORTA CIPHER
➡The Porta Cipher is a polyalphabetic substitution cipher invented by Giovanni Battista della Porta. Where the Vigenere cipher is a polyalphabetic cipher with 26 alphabets, the Porta is basically the same except it only uses 13 alphabets. The 13 cipher alphabets it uses are reciprocal, so enciphering is the same as deciphering.
Example:
Key = BLACK
jwyqjzwgabuwozsppcomnvr = Welcome to the Black Parade

☑PERIODIC TABLE OF ELEMENTS/ ATOMIC NUMBER CIPHER
➡Refer to the atomic number of the elements in the periodic table.
Example:
Cipher: 20,60,39 20,10
Decipher: Candy Cane

☑KENNY'S CODE
Example:
Keys: a,b,c
Cipher: baccacaacbab
Decipher: LUCK

A=aaa
B=aab
C=aac
D=aba
E=abb
F=abc
G=aca
H=acb
I=acc
J=baa
K=bab
L=bac
M=bba
N=bbb
O=bbc
P=bca
Q=bcb
R=bcc
S=caa
T=cab
U=cac
V=cba
W=cbb
X=cbc
Y=cca
Z=ccb

☑CHRONOGRAM
A chronogram is a sentence or inscription in which specific letters, interpreted as numerals, stand for a particular date when rearranged. (c)Wikipedia
Example: ChrIstVs DuX ergo trIVMphVs
Decipher: 1627

Creepy Things in InternetTahanan ng mga kuwento. Tumuklas ngayon