WP20234D5A

  • History of Cryptology

    January 3, 2024

    An introduction to the history of cryptology.
  • Hexadecimal

    January 3, 2024

    We see this a lot in the world of cyber computing! In the world of malware we look for the…
  • Grille Method

    January 3, 2024

    Dating back to the 1600s the Grille Method require a punch card pattern to decipher a message.
  • Graphical Ciphers

    January 3, 2024

    Starfish hanging about or a secret message?? This can get really interesting quick!
  • Double-Transposition Cipher

    January 3, 2024

    Pick a keyword to then encode your message - works great!
  • Diagraphic Substitution

    January 3, 2024

    It's not that complicated...you're just substituting out two letters found within a matrix or pattern.
  • Concealment Ciphers

    January 3, 2024

    Hidden before your very eyes, tricky and fun!
  • Compass Cipher

    January 3, 2024

    Use a compass, or any pattern desired, to generate a cipher.
  • Cipher Clocks

    January 3, 2024

    Simple correlation - easy to customize and create from any number, letter, or symbol.
  • ASCII

    January 3, 2024

    ASCII was invented last century to standardize hardware and software for interoperable compatibility. Today we see it in computing as…