Cipher | Definition, Types, & Facts (2024)

cryptology

verifiedCite

While every effort has been made to follow citation style rules, there may be some discrepancies.Please refer to the appropriate style manual or other sources if you have any questions.

Select Citation Style

Feedback

Thank you for your feedback

Our editors will review what you’ve submitted and determine whether to revise the article.

External Websites

Britannica Websites

Articles from Britannica Encyclopedias for elementary and high school students.

  • ciphers and codes - Student Encyclopedia (Ages 11 and up)

Print

verifiedCite

While every effort has been made to follow citation style rules, there may be some discrepancies.Please refer to the appropriate style manual or other sources if you have any questions.

Select Citation Style

Feedback

Thank you for your feedback

Our editors will review what you’ve submitted and determine whether to revise the article.

External Websites

Britannica Websites

Articles from Britannica Encyclopedias for elementary and high school students.

  • ciphers and codes - Student Encyclopedia (Ages 11 and up)

Also known as: cipher system, cryptosystem, single-key cryptography

Written and fact-checked by

The Editors of Encyclopaedia Britannica Encyclopaedia Britannica's editors oversee subject areas in which they have extensive knowledge, whether from years of experience gained by working on that content or via study for an advanced degree. They write new content and verify and edit content received from contributors.

The Editors of Encyclopaedia Britannica

Article History

ADFGVX cipher

See all media

Key People:
Agnes Meyer Driscoll
Related Topics:
Data Encryption Standard
public-key cryptography
transposition cipher
substitution cipher
product cipher

See all related content →

cipher, any method of transforming a message to conceal its meaning. The term is also used synonymously with ciphertext or cryptogram in reference to the encrypted form of the message. A brief treatment of ciphers follows. For full treatment, see cryptology.

All ciphers involve either transposition or substitution, or a combination of these two mathematical operations—i.e., product ciphers. In transposition cipher systems, elements of the plaintext (e.g., a letter, word, or string of symbols) are rearranged without any change in the identity of the elements. In substitution systems, such elements are replaced by other objects or groups of objects without a change in their sequence. In systems involving product ciphers, transposition and substitution are cascaded; for example, in a system of this type called a fractionation system, a substitution is first made from symbols in the plaintext to multiple symbols in the ciphertext, which is then superencrypted by a transposition. All operations or steps involved in the transformation of a message are carried out in accordance to a rule defined by a secret key known only to the sender of the message and the intended receiver.

Britannica QuizCodes, Secrets, and Ciphers Quiz

Cipher devices or machines have commonly been used to encipher and decipher messages. The first cipher device appears to have been employed by the ancient Greeks around 400 bce for secret communications between military commanders. This device, called the scytale, consisted of a tapered baton around which was spirally wrapped a piece of parchment inscribed with the message. When unwrapped the parchment bore an incomprehensible set of letters, but when wrapped around another baton of identical proportions, the original text reappeared. Other simple devices known as cipher disks were used by European governments for diplomatic communications by the late 1400s. These devices consisted of two rotating concentric circles, both bearing a sequence of 26 letters. One disk was used to select plaintext letters, while the other was used for the corresponding cipher component.

In 1891 Étienne Bazeries, a French cryptologist, invented a more sophisticated cipher device based on principles formulated by Thomas Jefferson of the United States nearly a century earlier. Bazeries’s so-called cylindrical cryptograph was made up of 20 numbered rotatable disks, each with a different alphabet engraved on its periphery. The disks were arranged in an agreed-upon order on a central shaft and rotated so that the first 20 letters of the message plaintext appeared in a row; the ciphertext was then formed by arbitrarily taking off any other row. The remaining letters of the message were treated in the same way, 20 letters at a time.

Advances in radio communications and electromechanical technology in the 1920s brought about a revolution in cryptodevices—the development of the rotor cipher machine. One common type of rotor system implemented product ciphers with simple monoalphabetic substitution ciphers as factors. The rotors in this machine consisted of disks with electrical contacts on each side that were hardwired to realize an arbitrary set of one-to-one connections (monoalphabetic substitution) between the contacts on opposite sides of the rotor.

The rotor cipher machine was used extensively by both the Allied and the Axis powers during World War II, with the most notable such device being the German Enigma machine. The application of electronic components in subsequent years resulted in significant increases in operation speed though no major changes in basic design. Since the early 1970s, cryptologists have adapted major developments in microcircuitry and computer technology to create new, highly sophisticated forms of cryptodevices and cryptosystems, as exemplified by the Fibonacci generator and the implementation of the Data Encryption Standard (DES) through the use of microprocessors.

The Editors of Encyclopaedia BritannicaThis article was most recently revised and updated by Erik Gregersen.

Cipher | Definition, Types, & Facts (2024)
Top Articles
Conductor | Techniques, Roles & Benefits
What Are Critical Thinking Skills and Why Are They Important?
Craigslist Myrtle Beach Motorcycles For Sale By Owner
Unit 30 Quiz: Idioms And Pronunciation
Cottonwood Vet Ottawa Ks
Chambersburg star athlete JJ Kelly makes his college decision, and he’s going DI
9192464227
Overnight Cleaner Jobs
Shorthand: The Write Way to Speed Up Communication
The Best English Movie Theaters In Germany [Ultimate Guide]
Tiraj Bòlèt Florida Soir
House Of Budz Michigan
Missed Connections Dayton Ohio
Unlv Mid Semester Classes
Aldi Süd Prospekt ᐅ Aktuelle Angebote online blättern
Transfer and Pay with Wells Fargo Online®
Lonesome Valley Barber
Unity - Manual: Scene view navigation
north jersey garage & moving sales - craigslist
Katie Sigmond Hot Pics
Best Nail Salons Open Near Me
Rubber Ducks Akron Score
Makemv Splunk
Arlington Museum of Art to show shining, shimmering, splendid costumes from Disney Archives
Effingham Daily News Police Report
Craigslist Northern Minnesota
Visit the UK as a Standard Visitor
Skepticalpickle Leak
Mawal Gameroom Download
Western Gold Gateway
October 31St Weather
Tmka-19829
Metra Schedule Ravinia To Chicago
Blasphemous Painting Puzzle
Panorama Charter Portal
“To be able to” and “to be allowed to” – Ersatzformen von “can” | sofatutor.com
Postgraduate | Student Recruitment
Best GoMovies Alternatives
Shipping Container Storage Containers 40'HCs - general for sale - by dealer - craigslist
Linkbuilding uitbesteden
Peace Sign Drawing Reference
Tommy Bahama Restaurant Bar & Store The Woodlands Menu
Www Pig11 Net
60 Days From August 16
17 of the best things to do in Bozeman, Montana
French Linen krijtverf van Annie Sloan
Mikayla Campinos Alive Or Dead
91 East Freeway Accident Today 2022
Duffield Regional Jail Mugshots 2023
7 National Titles Forum
Wayward Carbuncle Location
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 5808

Rating: 4 / 5 (41 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.