Cipher | Definition, Types, & Facts (2024)

cryptology

verifiedCite

While every effort has been made to follow citation style rules, there may be some discrepancies.Please refer to the appropriate style manual or other sources if you have any questions.

Select Citation Style

External Websites

Britannica Websites

Articles from Britannica Encyclopedias for elementary and high school students.

  • ciphers and codes - Student Encyclopedia (Ages 11 and up)

Print

verifiedCite

While every effort has been made to follow citation style rules, there may be some discrepancies.Please refer to the appropriate style manual or other sources if you have any questions.

Select Citation Style

Feedback

Thank you for your feedback

Our editors will review what you’ve submitted and determine whether to revise the article.

External Websites

Britannica Websites

Articles from Britannica Encyclopedias for elementary and high school students.

  • ciphers and codes - Student Encyclopedia (Ages 11 and up)

Also known as: cipher system, cryptosystem, single-key cryptography

Written and fact-checked by

The Editors of Encyclopaedia Britannica Encyclopaedia Britannica's editors oversee subject areas in which they have extensive knowledge, whether from years of experience gained by working on that content or via study for an advanced degree. They write new content and verify and edit content received from contributors.

The Editors of Encyclopaedia Britannica

Article History

ADFGVX cipher

See all media

Key People:
Agnes Meyer Driscoll
Related Topics:
Data Encryption Standard
public-key cryptography
transposition cipher
substitution cipher
product cipher

See all related content →

cipher, any method of transforming a message to conceal its meaning. The term is also used synonymously with ciphertext or cryptogram in reference to the encrypted form of the message. A brief treatment of ciphers follows. For full treatment, see cryptology.

All ciphers involve either transposition or substitution, or a combination of these two mathematical operations—i.e., product ciphers. In transposition cipher systems, elements of the plaintext (e.g., a letter, word, or string of symbols) are rearranged without any change in the identity of the elements. In substitution systems, such elements are replaced by other objects or groups of objects without a change in their sequence. In systems involving product ciphers, transposition and substitution are cascaded; for example, in a system of this type called a fractionation system, a substitution is first made from symbols in the plaintext to multiple symbols in the ciphertext, which is then superencrypted by a transposition. All operations or steps involved in the transformation of a message are carried out in accordance to a rule defined by a secret key known only to the sender of the message and the intended receiver.

Britannica QuizCodes, Secrets, and Ciphers Quiz

Cipher devices or machines have commonly been used to encipher and decipher messages. The first cipher device appears to have been employed by the ancient Greeks around 400 bce for secret communications between military commanders. This device, called the scytale, consisted of a tapered baton around which was spirally wrapped a piece of parchment inscribed with the message. When unwrapped the parchment bore an incomprehensible set of letters, but when wrapped around another baton of identical proportions, the original text reappeared. Other simple devices known as cipher disks were used by European governments for diplomatic communications by the late 1400s. These devices consisted of two rotating concentric circles, both bearing a sequence of 26 letters. One disk was used to select plaintext letters, while the other was used for the corresponding cipher component.

In 1891 Étienne Bazeries, a French cryptologist, invented a more sophisticated cipher device based on principles formulated by Thomas Jefferson of the United States nearly a century earlier. Bazeries’s so-called cylindrical cryptograph was made up of 20 numbered rotatable disks, each with a different alphabet engraved on its periphery. The disks were arranged in an agreed-upon order on a central shaft and rotated so that the first 20 letters of the message plaintext appeared in a row; the ciphertext was then formed by arbitrarily taking off any other row. The remaining letters of the message were treated in the same way, 20 letters at a time.

Advances in radio communications and electromechanical technology in the 1920s brought about a revolution in cryptodevices—the development of the rotor cipher machine. One common type of rotor system implemented product ciphers with simple monoalphabetic substitution ciphers as factors. The rotors in this machine consisted of disks with electrical contacts on each side that were hardwired to realize an arbitrary set of one-to-one connections (monoalphabetic substitution) between the contacts on opposite sides of the rotor.

The rotor cipher machine was used extensively by both the Allied and the Axis powers during World War II, with the most notable such device being the German Enigma machine. The application of electronic components in subsequent years resulted in significant increases in operation speed though no major changes in basic design. Since the early 1970s, cryptologists have adapted major developments in microcircuitry and computer technology to create new, highly sophisticated forms of cryptodevices and cryptosystems, as exemplified by the Fibonacci generator and the implementation of the Data Encryption Standard (DES) through the use of microprocessors.

The Editors of Encyclopaedia BritannicaThis article was most recently revised and updated by Erik Gregersen.

Cipher | Definition, Types, & Facts (2024)
Top Articles
LiFePO4 Batteries - Maintenance Tips and 6 Mistakes to Avoid
Do Student Pilots or CFIs Need Non-Owned Insurance?  - Sunset Aviation Insurance
What Times What Equals 86
Restaurants Near Applebee's
Bismarck Mandan Mugshots
I Hop Restaurant Near Me
15 Universal Studios Hollywood Tips You NEED To Read (2023)
J'ai essayé cette astuce Abercrombie & Fitch qui est partout sur Internet.
Finn Wolfhard Updates
Funny Spotify Playlist Covers 300X300
Bella 700 RAID - Powerboat and RIB
Pre-delivery Inspection PDI Checklists PDF Reports New Vehicle Pre Delivery Inspection Checklist
The Forum View From My Seat
❤️ Red Heart Emoji Guide For All Girls and Boys
Tcc Virginia Beach Testing Center
El Croquis 111 - MVRDV 1997-2002.pdf - PDFCOFFEE.COM
Elements Of Modernism Mastery Test
Why Did Mountain Creek Mud Bog Close
Noaa Rochester Mn
10 Best Hamster Toys (2023 Update) - The Pet Savvy
Getaway Shootout Github
Katherine Grant Wilkes County Ga
Mynusclevideo
Bay Country Crab Supply
Script Main Line 35 Joiplay
¿Cuándo se regalan flores amarillas y por qué se realiza este ritual en septiembre?
Norton Immediate Care Brownsboro
Rivendell Kennel Maine
Contact | Claio
Sherwin Paints Locations
The Cure Average Setlist
Grab this ice cream maker while it's discounted in Walmart's sale | Digital Trends
844-793-3456
Navy Female Prt Standards 30 34
Kitra Somers
PRISME LIBRE PIMER & MIST
Aahmaal
Musas Tijuana
Hapi Burkett
Sinfuldeeds Russian French
Ixl Mililani High School
Walmart Beach Lunch Lounge Dress
Joy Ride 2023 Showtimes Near Amc Ward Parkway
Oro probablemente a duna Playa e nomber Oranjestad un 200 aña pasa, pero Playa su historia ta bay hopi mas aña atras
Bobs Kart Forum
Cbx Promo Codes 2023
Oppenheimer Showtimes Near Cinemark Denton
Round Cake Pans Walmart
Latest Posts
Article information

Author: Fredrick Kertzmann

Last Updated:

Views: 6610

Rating: 4.6 / 5 (46 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Fredrick Kertzmann

Birthday: 2000-04-29

Address: Apt. 203 613 Huels Gateway, Ralphtown, LA 40204

Phone: +2135150832870

Job: Regional Design Producer

Hobby: Nordic skating, Lacemaking, Mountain biking, Rowing, Gardening, Water sports, role-playing games

Introduction: My name is Fredrick Kertzmann, I am a gleaming, encouraging, inexpensive, thankful, tender, quaint, precious person who loves writing and wants to share my knowledge and understanding with you.