Mark Knowles > 01-01-2022, 06:26 PM
(01-01-2022, 06:21 PM)Ranceps Wrote: You are not allowed to view links. Register or Login to view.Don't know if it helps, but I found a website containing a lot of cyphers. Might not be exactly what you are looking for, but still can provide some goodies
You are not allowed to view links. Register or Login to view.
Mark Knowles > 01-01-2022, 06:33 PM
Mark Knowles > 02-01-2022, 06:55 PM
R. Sale > 03-01-2022, 07:20 PM
Mark Knowles > 03-01-2022, 09:11 PM
(03-01-2022, 07:20 PM)R. Sale Wrote: You are not allowed to view links. Register or Login to view.In all of these various examples, what sorts of techniques were used? Are they mainly substitution ciphers that differ in the uniqueness and complexity of their keys? Or are there also other techniques like anagramming or steganography or something else?Essentially, yes are right when you said "they mainly substitution ciphers that differ in the uniqueness and complexity of their keys". And there can be a pretty big difference between their complexity and definitely some which have really unique features.
R. Sale > 03-01-2022, 10:25 PM
Mark Knowles > 04-01-2022, 10:06 AM
(03-01-2022, 10:25 PM)R. Sale Wrote: You are not allowed to view links. Register or Login to view.So, if substitution is the primary technique in use, what other methods were being used?If possible can you post your comments/questions about cryptography on another cryptography related thread as I want to reserve this thread on the off-chance that someone else will find a cipher that I don't know about.
Mark Knowles > 17-03-2022, 03:39 PM
Mark Knowles > 17-03-2022, 03:57 PM
Mark Knowles > 18-03-2022, 07:14 PM