Core Concepts & Ciphers
Cryptography β The science of hiding and solving secret messages.
Cipher β A method or system for disguising a message.
Plaintext β The original, readable message.
Ciphertext β The encoded or encrypted version of the plaintext.
Encryption / Encipher β Turning readable text (plaintext) into secret form (ciphertext) using a specific key, meant to be reversible only with that key.
Decryption / Decipher β Turning ciphertext back into plaintext using the key that was used to encrypt it.
Key β The secret information used to encrypt or decrypt a message.
Encoding β Changing data into another format for transmission or storage (like Base64), not necessarily secret, and often reversible without a key.
Decoding β Reversing an encoding process (like Base64 decoding), doesnβt require a key and is usually meant to be publicly reversible.
Transcribe β To copy or rewrite something exactly as it appears using a standard alphabet, often used when typing out a cipher made of symbols, for example β#%1 31/β would become βABC DCEβ.
Substitution β Replacing each letter or symbol with something else (e.g., A β X), used in many basic ciphers.
Monoalphabetic β A cipher that replaces each letter with only one possible substitute throughout the message, for example the caesar cipher.
Caesar Shift β A specific type of shift cipher where each letter is shifted by the same fixed number.
Rot β A slang for caesar cipher, rot8 would for example mean a caesar cipher with a shift of 8.
Cryptogram β A monoalphabetic substitution cipher usually with a random alphabet
Polyalphabetic β A cipher that uses multiple alphabets to change how letters are replaced, making it harder to crack, for example the vigenere cipher.
Keyword β An arbitrary selected word used as a key.
Tabula Recta/VigenΓ¨re Square β A table with a normal alphabet as a row or column, and an encryption alphabet as the other. Used in VigenΓ¨re and similar ciphers.
Autokey β A cipher that uses parts of the plaintext itself as part of the key.
Running-key β A cipher using a long key, often from a book or another text, that changes constantly while encrypting.
One-Time Pad (OTP) β An unbreakable cipher that uses a truly random key the same length as the message, used only once.
Reciprocal β A cipher where encryption and decryption are the same process (like ROT13).
Homophonic β A cipher that uses multiple symbols or letters to represent the same letter to confuse frequency analysis.
Transposition β A cipher that rearranges the letters without changing them.
Permutation β Rearranging elements (like letters or blocks) in a specific order, often to confuse or hide patterns. A transposition cipher will usually have a permutation key.
Polygrammic / Polygraphic β Ciphers that work on chunks of multiple letters at once, like digraphs (2 letters) or trigraphs (3 letters), instead of single letters.
Monome/Mononome β A cipher unit that represents a single letter or symbol (like basic substitution of one letter at a time).
Triliteral β A symbol or cipher element made of 3 letters (often used in historical codes).
Anagram β Rearranging letters of a word/phrase to form a new one (e.g., "silent" β "listen").
A1Z26 β A cipher where the letters of the alphabet become their corresponding letter position. So A β 1 and Z β 26.
Polybius Square β A 5x5 grid used to convert letters to pairs of numbers or coordinates. With a normal polybius square 11 is A 12 is B. 5x5 squares can hold 25 letters, and the english alphabet has 26 so a polybius square alphabet usually discludes βJβ.
Classical Cryptography β Traditional cipher methods before computers, like Caesar, VigenΓ¨re, or Playfair.
Modern Cryptography β Computer-era encryption based on algorithms and math, like AES and RSA.
AES β A strong, modern encryption standard often used in secure communication (Advanced Encryption Standard).
Block Cipher β A cipher that encodes fixed-size blocks of text instead of letter by letter.
Block β A group of characters treated together in block ciphers.
Block Size β The number of bits or characters in each block (e.g. 128 bits).
Stream Cipher β A cipher that encrypts one bit or character at a time in a continuous stream.
Initialization Vector (IV) β A random value added to encryption to make it unique, even for the same message.
Padding β Extra characters added to a message to hide its true length or align it for encryption.
RSA β A common public-key encryption system used for secure data exchange.
PGP β βPretty Good Privacyβ; a tool that uses public-key cryptography to secure emails and files.
Public Key β A key you share with others so they can encrypt messages to you or verify your signature.
Private Key β A secret key only you keep, used to decrypt messages or create digital signatures.
Signature β A special code made with your private key to prove a message came from you and wasn't changed.
Post-Quantum Cryptography β Cryptography designed to resist attacks from quantum computers, which could at some point break current encryption methods.
Analysis, Tools & Hidden Data
Frequency β How often each letter or symbol appears in a text.
Frequency Analysis β Looking at letter/symbol frequencies to guess the plaintext or cipher used. Can also be used to figure out what language the plaintext might be in.
Index of Coincidence (IoC) β A measure of how likely letters repeat in a text; helps detect cipher type or key length.
Repetition β Repeated letters or chunks in a cipher that might reveal patterns or key length.
Shannon Index β A formula measuring how random or predictable a text is; higher means more randomness.
Unigram, Bigram / Digram / Bigraf, Trigram β These refer to 1-letter, 2-letter, and 3-letter chunks of text. Used in frequency analysis to find common patterns like "TH" or "ING".
Isogram / Heterogram β A word or phrase where no letter repeats (e.g., "lumberjack").
Cryptoanalysis β The art of breaking ciphers and uncovering hidden messages without knowing the key.
Crib β A guessed or known word or phrase that helps break a cipher (like knowing "the" appears in English, or knowing the person always signs their encrypted messages with their name.).
Cribbing β The act of searching for or using cribs to crack encryption.
Dragging / Sliding β A technique in cribbing where you move the guessed word across the ciphertext to find a match.
Brute Force β Trying every possible key or solution until the correct one is found.
Collision β When two different inputs give the same output (e.g., in a hash), which can be exploited or hint at a weakness.
Hash β A function that turns data into a fixed string. Itβs one-way: you can't turn it back into the original text unless you try to hash your own data until something matches the hash youβre cracking.
Salt β Random data added to a password before hashing it, so that two users with the same password get different hashes.
Checksum β A short code generated from data to verify itβs still the same data and hasnβt changed or been corrupted.
Steganography β Hiding information in plain sight, like in images, sound files, or even spaces and formatting.
Whitespace β Invisible characters (spaces, tabs, etc.) that can be used to hide messages in steganography.
Noise β Random or irrelevant data added to confuse, distract, or hide the real signal. Sometimes noise can be an unwanted side product.
Trailing β Data that comes after the intended message, possibly hiding extra info or noise. βHello World β has a trailing whitespace.
Obfuscation β Deliberately making something harder to understand without truly hiding it.
Red Herring β A deliberate distraction in puzzles to mislead you away from the real solution.
SSTV β Slow-Scan Television; a way of sending images over radio that can be encoded with hidden info. You can often hear if an audio message is SSTV.
Metadata β Data about data, like the author of a file or the time an image was created within the file; sometimes holds hidden clues.
LSB (Least Significant Bit) β The smallest bit of data, often used in image/audio steganography to hide secret bits.
Bitplane β A layer of bits across an image; changing a single bitplane can hide or reveal hidden patterns.
Fourier Transformation β Converts a signal (like sound) into frequencies; useful to find patterns or hidden messages.
Spectral Analysis β Looking at the frequency content of a signal (e.g., audio or image), often used to detect hidden info.
Spectrogram β A visual map of frequencies over time, often used in puzzles to hide text or imagery.
Algorithm β A step-by-step method to encrypt or decrypt data, like a recipe computers follow.
Bit β A single 0 or 1; the smallest unit of digital data.
Byte β A group of 8 bits; often represents a single character in text or a chunk of data.
Numeral β A symbol or number (like 7 or X) used in a numeric system, sometimes important in ciphers.
Base β A numbering system (like base-10 = decimal, base-2 = binary or base-64). There are often used to encode raw data.
Raw Data β Unprocessed information, if viewed without an encoding it will often look gibberish.
Binary β A language of 0s and 1s. Computers and some puzzles use it as a base form of data.
ASCII β An older character standard using numbers 0β127 to represent English letters and symbols.
Unicode β A standard for representing characters from almost every language (like emojis, Arabic, etc.).
Boolean β A true/false value, often used in logic puzzles or computer-based cipher tools.
Logical Operator β Tools like AND, OR, XOR, NOT used in logic and bitwise encryption schemes.
Modulo β A math operation that gives the remainder (often used in Caesar or VigenΓ¨re ciphers for wrapping around alphabets).
Bit Shift β Moving bits left or right, often used in ciphers or encoding to change values subtly.
Regex (Regular Expression) β A tool for searching or matching patterns in text. For example [A-Z0-9] would match all characters that are either A to Z or 0 to 9.
Hill Climbing β A guessing algorithm that tweaks a solution bit by bit, keeping changes that improve it (like trying small key changes to decrypt something better).
Esolang β Short for "esoteric language," like Brainfuck or Befunge β weird programming languages sometimes used in puzzles.
Mnemonic key β A key constructed as to be easily remembered.
Matrix β A grid of letters or numbers, often used in ciphers like the Hill cipher to transform text mathematically.
Periodic/Aperiodic β Periodic means the cipher repeats in a pattern (e.g. every 3 letters); aperiodic means it doesnβt follow a strict repeat.
Idiomorphic β means that a plaintext or cipher has a noticeable pattern β especially where and how often letters repeat. It looks βstructuredβ or βnot randomβ because of those repeating parts. Think of it like this: If you see something like "ABABAB", that is idiomorphic because thereβs a clear repeating pattern.
Idiome β A recognizable style or structure in ciphertext (like a cipherβs βaccentβ or common traits).
Prefix β A piece of data or text added at the beginning of a message. β+1β uses β+β as a prefix.
Suffix β A piece of data or text added at the end of a message. β1+β uses β+β as a suffix.
Separator β A symbol or space that splits sections of a message like a space or colon.