Important alert: (current site time 7/16/2013 1:08:02 AM EDT)
 

winzip icon

[ Cipher Classics ]

Email
Submitted on: 2/17/2005 4:19:44 PM
By: D. Rijmenants  
Level: Beginner
User Rating: By 6 Users
Compatibility: VB 5.0, VB 6.0
Views: 31383
author picture
(About the author)
 
     Encryption with a list of classic field-ciphers. Encrypt swift and easy with this program, or try out the pencil-and-paper versions by following the instructions on how to use them "in the field", as many secret agents and soldiers did. Use ADFGVX, Caesar Shift, Single or Double Columnar Transposition, Playfair, the Straddling Checkerboard or Vigenère. Discover now, after the thrill of using my Enigma machine ;-), the secret world of the field ciphers. All comments and ideas welcome ;-) *** New Updated 3/17 !!! added Print option ***

 
winzip iconDownload code

Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. Afterdownloading it, you will need a program like Winzip to decompress it.Virus note:All files are scanned once-a-day by Planet Source Code for viruses, but new viruses come out every day, so no prevention program can catch 100% of them. For your own safety, please:
  1. Re-scan downloaded files using your personal virus checker before using it.
  2. NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.
  3. Scan the source code with Minnow's Project Scanner

If you don't have a virus scanner, you can get one at many places on the net including:McAfee.com

 
Terms of Agreement:   
By using this code, you agree to the following terms...   
  1. You may use this code in your own programs (and may compile it into a program and distribute it in compiled format for languages that allow it) freely and with no charge.
  2. You MAY NOT redistribute this code (for example to a web site) without written permission from the original author. Failure to do so is a violation of copyright laws.   
  3. You may link to this code from another website, but ONLY if it is not wrapped in a frame. 
  4. You will abide by any additional copyright restrictions which the author may have placed in the code or code's description.


Other 28 submission(s) by this author

 


Report Bad Submission
Use this form to tell us if this entry should be deleted (i.e contains no code, is a virus, etc.).
This submission should be removed because:

Your Vote

What do you think of this code (in the Beginner category)?
(The code with your highest vote will win this month's coding contest!)
Excellent  Good  Average  Below Average  Poor (See voting log ...)
 

Other User Comments
2/17/2005 4:57:09 PMD. Rijmenants

For a great site with all about codes, ciphers and codebreaking: www.vectorsite.net/ttcode.html
(If this comment was disrespectful, please report it.)

 
2/17/2005 6:46:06 PMJames Miller

Thanks Dirk! This answered some of the questions I had from my "prescribed" reading.
James
(If this comment was disrespectful, please report it.)

 
2/17/2005 7:45:52 PMJames Miller

I have a question. What if you used the Diagraph cypher method of encryption ... removed the spaces then XOR then Vigenere it. Would that make the "encrypted" message more secure since you're "flat-lining" the letter frequency which is already altered?
(If this comment was disrespectful, please report it.)

 
2/18/2005 5:06:47 AMD. Rijmenants

Fractionation on itselve is actually weak, and should always be combined with transpositions. It's a morevalue when suppressing peaks of freq. distribution (there are more ways to achieve homofony). Vigenere is a poly-alphabetic, weak and not a good candidate to combine with a homofone cipher. Ofcourse, it would be stronger, but one could use frequence analysis on vigenere to search for common pairs and once found, decode those pairs. Vigenere seems attractive to use in software, it can be performed byte after byte, but thats it's weakness, it doesn't achieve diffusion. Since transpositioning fractured text is not practical on large amounts of data, we were forced to go 'limited in size' and change to block ciphers, where you can code the bits and relocate them within a block of lets say 64 bits. Alternative to a vigenere key is a extremely long key, a stream cipher, but you need quality random and a initialize-vector or it can be used only once (big downside on RC4)
(If this comment was disrespectful, please report it.)

 
2/18/2005 5:13:45 AMD. Rijmenants

PS: I'm planning to add some other digraphs like Playfair and Four-Square ...have patience :-)
(If this comment was disrespectful, please report it.)

 
2/18/2005 9:22:46 AMUlli

I went to the site you recommended, it's great, although one public key encryption is missing, or at least I couldn't find it, and that's the sum decomposition algorithm invented by hellman in the late 70's I think. also I am not quite sure whether it is called that in english - it's about finding summands in a (pseudo)random list of values that add together to give a total, the total being the encoded chunk and the postions of the summands within the list represent the decoded bits.

(If this comment was disrespectful, please report it.)

 
2/18/2005 9:23:36 AMUlli

...anyway 5 globes for the link alone.
(If this comment was disrespectful, please report it.)

 
2/18/2005 9:31:09 AMD. Rijmenants

Yep, nice site. check out the Cyber page also http://www.vectorsite.net/indextt.html
(If this comment was disrespectful, please report it.)

 
2/18/2005 7:53:59 PMUlli

I found it: it's called the Hellman Knapsack Algorithm and it was cracked by Shamir in the 80's
(If this comment was disrespectful, please report it.)

 
5/15/2005 5:37:04 AMhelal mohsen

plz gaev me evrethaing
(If this comment was disrespectful, please report it.)

 
12/14/2006 10:19:43 PMPaul Turcksin

The usual XRSWH VGDDL EXCEL LENT VDAQS
(If this comment was disrespectful, please report it.)

 
8/11/2008 3:58:30 PMRisket

This program is awesome!! Playfair ciphers have always been my favorite ciphers! Ever since I was little kid I've loved writing messages using the Playfair Cipher. I actually thought about writing a program for decoding them. Which is how I ended up finding this one to see if it had already been done. I still think it'll be fun to make one though.
(If this comment was disrespectful, please report it.)

 
11/29/2008 6:17:34 AMkhanh

I don't known the code "ADFGVX" please help me! Thank you very much!
(If this comment was disrespectful, please report it.)

 
11/29/2008 6:18:06 AMkhanh

i
(If this comment was disrespectful, please report it.)

 

Add Your Feedback
Your feedback will be posted below and an email sent to the author. Please remember that the author was kind enough to share this with you, so any criticisms must be stated politely, or they will be deleted. (For feedback not related to this particular code, please click here instead.)
 

To post feedback, first please login.