Ciphers from the Classical Era
The classical algorithms are those invented pre-computer up until around the 1950's. The list below is roughly ordered by complexity, least complex at the top.
Classical ciphers are cryptographic algorithms that have been used in the past (pre WWII). Some of them have only ever been used by amateurs (e.g. Bifid), while some of them have been used by armies to secure their top level communications (e.g. ADFGVX).
None of these algorithms are very secure as far as protecting information goes (with todays computers to break them), so if real data security is needed you should probably look at modern algorithms.
The Atbash cipher is a substitution cipher with a specific key where the letters of the alphabet are reversed. I.e. all As are replaced with Zs, all Bs are replaced with Ys, and so on.
The ROT13 cipher is not really a cipher, more just a way to obscure information temporarily. It is often used to hide e.g. movie spoilers.
The caesar cipher (a.k.a the shift cipher, Caesar's Code or Caesar Shift) is one of the earliest known and simplest ciphers.
A type of simple substitution cipher, very easy to crack.
A simple transposition cipher.
The Baconian cipher is a 'biliteral' cipher, i.e. it employs only 2 characters. It is a substitution cipher.
The Polybius Square is essentially identical to the simple substitution cipher, except that each plaintext character is enciphered as 2 ciphertext characters.
A simple cipher used by governments for hundreds of years. Code is provided for encryption, decryption and cryptanalysis.
Nomenclators are a mix between substitution ciphers and Codes, used extensively during the middle ages. Codes in various forms were used up until fairly recently.
Another simple transposition cipher in which letters are arranged in rows and the columns are transposed according to a key.
The Autokey cipher is closely related to the Vigenere cipher, it differs in how the key material is generated. The Autokey cipher uses a key word in addition to the plaintext as its key material, this makes it more secure than Vigenere.
Very similar to the Vigenere cipher, but slightly different algorithm.
The Porta cipher is a polyalphabetic substitution cipher that uses a keyword to choose which alphabet to encipher letters.
The Running Key cipher is similar to the Vigenere cipher, but the key is usually a long piece of non-repeating text. This makes it harder to break in general than the Vigenere or Autokey ciphers.
A more complex polyalphabetic substitution cipher. Code is provided for encryption, decryption and cryptanalysis.
The Homophonic Substitution cipher is a substitution cipher in which single plaintext letters can be replaced by any of several different ciphertext letters. They are generally much more difficult to break than standard substitution ciphers.
An algorithm invented by Felix Delastelle, published in 1902
An algorithm based on matrix theory. Very good at diffusion.
The technique encrypts pairs of letters (digraphs), instead of single letters as in the simple substitution cipher. The Playfair cipher is thus significantly harder to break since the frequency analysis used for simple substitution ciphers does not work with it.
A fractionating transposition cipher. Used by the Germans during the first world war, but cracked by the French. Quite a difficult cipher to break.
A fractionating transposition cipher. Used by the Germans during the first world war, closely related to ADFGVX (Note the extra V in the name).
A fractionating transposition cipher. Only ever used by amateur cryptographers. Can be broken fairly easily.
A substitution cipher with variable length substitutions.
A fractionating transposition cipher. A variant of Bifid.
Fractionated Morse first converts the plaintext to morse code, then enciphers fixed size blocks of morse code back to letters. This procedure means plaintext letters are mixed into the ciphertext letters i.e. one plaintext letter does not map to one ciphertext letter.
List of Classical ciphers:
- Atbash Cipher
- ROT13 Cipher
- Caesar Cipher
- Affine Cipher
- Rail-fence Cipher
- Baconian Cipher
- Polybius Square Cipher
- Simple Substitution Cipher
- Codes and Nomenclators Cipher
- Columnar Transposition Cipher
- Autokey Cipher
- Beaufort Cipher
- Porta Cipher
- Running Key Cipher
- Vigenère and Gronsfeld Cipher
- Homophonic Substitution Cipher
- Four-Square Cipher
- Hill Cipher
- Playfair Cipher
- ADFGVX Cipher
- ADFGX Cipher
- Bifid Cipher
- Straddle Checkerboard Cipher
- Trifid Cipher
- Fractionated Morse Cipher