SMOLNET PORTAL home about changes

References for Transposition cipher

Back to article


References to other articles, organized by section

ADFGVX cipher
Advanced Encryption Standard
Ciphertext
Cryptography
Permutation
Plaintext
Substitution cipher

General principle

Cryptanalysis
Jigsaw puzzle
Key (cryptography)

Scytale

Ancient Greeks
Scytale

Route cipher

American Civil War
Code (cryptography)
Rail fence

Columnar transposition

Samuel Morland

Double transposition

Anagram

Another example

Le Matin (France)
Maquis (World War II)
Netherlands in World War II
Office of Strategic Services
Special Operations Executive
VIC cipher
World War I

Disrupted transposition

Rasterschlüssel 44

Comb approach

Luigi Sacco

Detection and cryptanalysis

1876 presidential election
1878–79 United States House of Representatives elections
Anagram
Brute-force attack
Cryptanalysis
Democratic Party (United States)
Edward S. Holden
Frequency distribution
Genetic algorithm
Hill climbing
John R. G. Hassard
Known-plaintext attack
New-York Tribune
Vote buying
Zodiac Killer

Combinations

Substitution cipher

Fractionation

ADFGVX cipher
Bifid cipher
Block cipher
Claude E. Shannon
Confusion and diffusion
Morse code
Polybius square
Straddling checkerboard
Trifid cipher
VIC cipher


Source on Wikipedia (https://en.wikipedia.org)


--

Gemipedia Home
Go to Article
Using English Wikipedia. Change Language?

--
Size: 3.63 KB. 95.95% smaller than original: 89.75 KB 🤮
Fetched: 17 ms. Converted: 367 ms. 🐇

Made with 📚 and ❤️ by Acidus (mailto://)

All Wikipedia content is licensed under CC BY-SA 3.0

Response: 20 (Success), text/gemini
Original URLgemini://gemi.dev/cgi-bin/wp.cgi/refs?name=Transposition+cipher
Status Code20 (Success)
Content-Typetext/gemini; charset=utf-8; lang=en