Update typos in cipher descriptions
This commit is contained in:
@@ -1,10 +1,10 @@
|
|||||||
#Mono-Substitution
|
#Mono-Substitution
|
||||||
#Affine
|
#Affine
|
||||||
cipher.mono.affine.name=Affine
|
cipher.mono.affine.name=Affine
|
||||||
cipher.mono.affine.description=The Affine cipher is a monoalphabetic substitution cipher where each letter in the alphabet is mapped to a numeric equivalent and encrypted using a mathematical function.
|
cipher.mono.affine.description=The Affine cipher is a mono-alphabetic substitution cipher where each letter in the alphabet is mapped to a numeric equivalent and encrypted using a mathematical function.
|
||||||
cipher.mono.affine.explanation={\
|
cipher.mono.affine.explanation={\
|
||||||
"Encryption is performed by converting every letter to a number with a = 0, b = 1, c = 2, etc., then applying a function to each number, then converting each number back to a letter.",\
|
"Encryption is performed by converting every letter to a number with a = 0, b = 1, c = 2, etc., then applying a function to each number, then converting each number back to a letter.",\
|
||||||
"The formula used in this encryption is F(x) = (ax + b) % m, where x is the original letter, a and b are the keys of the cipher, and m is the length of the alphabet, with a and m being coprime.",\
|
"The formula used in this encryption is F(x) = (ax + b) % m, where x is the original letter, a and b are the keys of the cipher, and m is the length of the alphabet, with a and m being co-prime.",\
|
||||||
"Decryption is performed using the formula F(x) = a^-1(x - b) % m.",\
|
"Decryption is performed using the formula F(x) = a^-1(x - b) % m.",\
|
||||||
"The Affine cipher is a relatively weak cipher compared to modern encryption methods because it's vulnerable to frequency analysis and other cryptanalysis techniques. However, it's simple to implement and understand, making it a good introduction to encryption concepts."\
|
"The Affine cipher is a relatively weak cipher compared to modern encryption methods because it's vulnerable to frequency analysis and other cryptanalysis techniques. However, it's simple to implement and understand, making it a good introduction to encryption concepts."\
|
||||||
}
|
}
|
||||||
@@ -15,7 +15,7 @@ cipher.mono.affine.facts={\
|
|||||||
cipher.mono.atbash.name=Atbash
|
cipher.mono.atbash.name=Atbash
|
||||||
cipher.mono.atbash.description=The Atbash cipher is a substitution cipher where each letter of the plaintext is replaced by its counterpart in the reverse alphabet.
|
cipher.mono.atbash.description=The Atbash cipher is a substitution cipher where each letter of the plaintext is replaced by its counterpart in the reverse alphabet.
|
||||||
cipher.mono.atbash.explanation={\
|
cipher.mono.atbash.explanation={\
|
||||||
"The Atbash cipher is a monoalphabetic substitution cipher and is one of the simplest and oldest forms of encryption.",\
|
"The Atbash cipher is a mono-alphabetic substitution cipher and is one of the simplest and oldest forms of encryption.",\
|
||||||
"Encryption involves replacing each letter with its reverse counterpart. i.e. A becomes Z, B becomes Y, etc.",\
|
"Encryption involves replacing each letter with its reverse counterpart. i.e. A becomes Z, B becomes Y, etc.",\
|
||||||
"Decryption is performed using the same formula as encryption.",\
|
"Decryption is performed using the same formula as encryption.",\
|
||||||
"Atbash cipher can effectively obscure the meaning of a message to those unfamiliar with the technique. However, it's very vulnerable to cryptanalysis, especially frequency analysis, and it provides very little security against modern decryption techniques."\
|
"Atbash cipher can effectively obscure the meaning of a message to those unfamiliar with the technique. However, it's very vulnerable to cryptanalysis, especially frequency analysis, and it provides very little security against modern decryption techniques."\
|
||||||
@@ -28,15 +28,15 @@ cipher.mono.atbash.facts={\
|
|||||||
|
|
||||||
#Autokey
|
#Autokey
|
||||||
cipher.mono.autokey.name=Autokey
|
cipher.mono.autokey.name=Autokey
|
||||||
cipher.mono.autokey.description=The Autokey cipher is a polyalphabetic substitution cipher where each letter of the plaintext is combined with a letter from a predetermined key sequence to generate the ciphertext.
|
cipher.mono.autokey.description=The Autokey cipher is a poly-alphabetic substitution cipher where each letter of the plaintext is combined with a letter from a predetermined key sequence to generate the ciphertext.
|
||||||
cipher.mono.autokey.explanation={\
|
cipher.mono.autokey.explanation={\
|
||||||
"The autokey cipher extends the Vigenere cipher. Like the Vigenere cipher it uses a keyword to encrypt plaintext, but it also incorporates the plaintext itself into the keystream.",\
|
"The autokey cipher extends the Vigenere cipher. Like the Vigenere cipher it uses a keyword to encrypt plaintext, but it also incorporates the plaintext itself into the key stream.",\
|
||||||
"Encryption works by concatenating the message to the keyword. Then you convert the resulting key into a series of numeric values mod 26. Then you advance each letter the indicated number of letters similar to the Caesar cipher.",\
|
"Encryption works by concatenating the message to the keyword. Then you convert the resulting key into a series of numeric values mod 26. Then you advance each letter the indicated number of letters similar to the Caesar cipher.",\
|
||||||
"Decryption works by converting the key the same as encryption, but instead of advancing each letter the given amount the values retreat. As each letter is decrypted the letter needs added to the key as well as the output so that decryption can continue.",\
|
"Decryption works by converting the key the same as encryption, but instead of advancing each letter the given amount the values retreat. As each letter is decrypted the letter needs added to the key as well as the output so that decryption can continue.",\
|
||||||
"The Autokey cipher is more secure than the Vigenere cipher due to the keyword including part of the text to be encoded. However, like the Vigenere cipher, the Autokey cipher is vulnerable to frequency analysis and other cryptanalysis techniques, especially if the keyword is short or if there are patterns in the plaintext."\
|
"The Autokey cipher is more secure than the Vigenere cipher due to the keyword including part of the text to be encoded. However, like the Vigenere cipher, the Autokey cipher is vulnerable to frequency analysis and other cryptanalysis techniques, especially if the keyword is short or if there are patterns in the plaintext."\
|
||||||
}
|
}
|
||||||
cipher.mono.autokey.facts={\
|
cipher.mono.autokey.facts={\
|
||||||
"The Autokey cipher was the inspiriation for the ADFGVX cipher, which Germany used during World War I",\
|
"The Autokey cipher was the inspiration for the ADFGVX cipher, which Germany used during World War I",\
|
||||||
"It has also served as the precursor to more complex modern encryption methods"\
|
"It has also served as the precursor to more complex modern encryption methods"\
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -111,7 +111,7 @@ cipher.mono.onetimepad.facts={\
|
|||||||
|
|
||||||
#Porta
|
#Porta
|
||||||
cipher.mono.porta.name=Porta
|
cipher.mono.porta.name=Porta
|
||||||
cipher.mono.porta.description=The Porta cipher is a polyalphabetic substitution cipher where each letter in the plaintext is shifted based on a keyword, using a fixed tabula.
|
cipher.mono.porta.description=The Porta cipher is a poly-alphabetic substitution cipher where each letter in the plaintext is shifted based on a keyword, using a fixed tabula.
|
||||||
cipher.mono.porta.explanation={\
|
cipher.mono.porta.explanation={\
|
||||||
"The Porta cipher, also known as the Porta square or Portax cipher, is a variant of the Vigenere cipher and shares some similarities with it.",\
|
"The Porta cipher, also known as the Porta square or Portax cipher, is a variant of the Vigenere cipher and shares some similarities with it.",\
|
||||||
"In the Porta cipher, encryption and decryption are performed using a keyword and a tabula recta or Porta square. The Porta square is a table that consists of 26 rows and 26 columns, where each row represents the alphabet shifted by a certain number of positions.",\
|
"In the Porta cipher, encryption and decryption are performed using a keyword and a tabula recta or Porta square. The Porta square is a table that consists of 26 rows and 26 columns, where each row represents the alphabet shifted by a certain number of positions.",\
|
||||||
@@ -121,8 +121,8 @@ cipher.mono.porta.explanation={\
|
|||||||
}
|
}
|
||||||
cipher.mono.porta.facts={\
|
cipher.mono.porta.facts={\
|
||||||
"It was invented by Giovanni Battista della Porta in the 16th century.",\
|
"It was invented by Giovanni Battista della Porta in the 16th century.",\
|
||||||
"It is one of the earliest known polyalphabetic ciphers, preceding the Vigenere cipher by several centuries.",\
|
"It is one of the earliest known poly-alphabetic ciphers, preceding the Vigenere cipher by several centuries.",\
|
||||||
"It was one of the first ciphers to use a keyword to deetermine the alphabetic shift."\
|
"It was one of the first ciphers to use a keyword to determine the alphabetic shift."\
|
||||||
}
|
}
|
||||||
|
|
||||||
#Substitution
|
#Substitution
|
||||||
@@ -142,9 +142,9 @@ cipher.mono.substitution.facts={\
|
|||||||
|
|
||||||
#Vigenere
|
#Vigenere
|
||||||
cipher.mono.vigenere.name=Vigenere
|
cipher.mono.vigenere.name=Vigenere
|
||||||
cipher.mono.vigenere.description=The Vigenere cipher is a polyalphabetic encryption method that uses a keyword and series of interwoven Caesar ciphers.
|
cipher.mono.vigenere.description=The Vigenere cipher is a poly-alphabetic encryption method that uses a keyword and series of interwoven Caesar ciphers.
|
||||||
cipher.mono.vigenere.explanation={\
|
cipher.mono.vigenere.explanation={\
|
||||||
"The Vigenere cipher adds more security compared to simple monoalphabetic substitution ciphers like the Caesar cipher.",\
|
"The Vigenere cipher adds more security compared to simple mono-alphabetic substitution ciphers like the Caesar cipher.",\
|
||||||
"In the Vigenere cipher, encryption and decryption are performed using a keyword or keyphrase. The key is used to determine the shift applied to each letter in the plaintext, with different parts of the key determining different shifts.",\
|
"In the Vigenere cipher, encryption and decryption are performed using a keyword or keyphrase. The key is used to determine the shift applied to each letter in the plaintext, with different parts of the key determining different shifts.",\
|
||||||
"Decryption is performed by applying the reverse process. Given the ciphertext and the keyword, the original plaintext can be recovered.",\
|
"Decryption is performed by applying the reverse process. Given the ciphertext and the keyword, the original plaintext can be recovered.",\
|
||||||
"The Vigenere cipher provides stronger encryption compared to simple substitution ciphers because it uses multiple Caesar ciphers in a repeating pattern determined by the keyword.",\
|
"The Vigenere cipher provides stronger encryption compared to simple substitution ciphers because it uses multiple Caesar ciphers in a repeating pattern determined by the keyword.",\
|
||||||
@@ -153,7 +153,7 @@ cipher.mono.vigenere.explanation={\
|
|||||||
}
|
}
|
||||||
cipher.mono.vigenere.facts={\
|
cipher.mono.vigenere.facts={\
|
||||||
"It was invented by Giovan Battista Bellaso in the 16th century and later misattributed to Blaise de Vigenere, hence the name.",\
|
"It was invented by Giovan Battista Bellaso in the 16th century and later misattributed to Blaise de Vigenere, hence the name.",\
|
||||||
"It is one of the earliest known examples of a polyalphabetic substitution cipher.",\
|
"It is one of the earliest known examples of a poly-alphabetic substitution cipher.",\
|
||||||
"It was cracked in the mid-19th century by Charles Babbage's assistant, Friedrich Kasiski. The method now known as the Kasiski examination exploits the repeated patters in the ciphertext to determine the length of the keyword."\
|
"It was cracked in the mid-19th century by Charles Babbage's assistant, Friedrich Kasiski. The method now known as the Kasiski examination exploits the repeated patters in the ciphertext to determine the length of the keyword."\
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -163,7 +163,7 @@ cipher.mono.vigenere.facts={\
|
|||||||
cipher.poly.bifid.name=Bifid
|
cipher.poly.bifid.name=Bifid
|
||||||
cipher.poly.bifid.description=The Bifid cipher involves converting plaintext characters into coordinates in a 5x5 grid, then transposing them into a single string using a keyword.
|
cipher.poly.bifid.description=The Bifid cipher involves converting plaintext characters into coordinates in a 5x5 grid, then transposing them into a single string using a keyword.
|
||||||
cipher.poly.bifid.explanation={\
|
cipher.poly.bifid.explanation={\
|
||||||
"The Bifid cipher is a type of polyalphabetic substitution cipher that combines elements of both transposition and substitution.",\
|
"The Bifid cipher is a type of poly-alphabetic substitution cipher that combines elements of both transposition and substitution.",\
|
||||||
"It was invented by Felix Delastelle in 1901 and was considered one of the strongest ciphers at the time due to its complexity.",\
|
"It was invented by Felix Delastelle in 1901 and was considered one of the strongest ciphers at the time due to its complexity.",\
|
||||||
"Encryption is done by creating a 5x5 grid, known as the Polybius square, is created. The letters of the alphabet (excluding 'J' in most cases) are arranged in the grid, typically starting with 'A' and ending with 'Z', omitting 'J'.",\
|
"Encryption is done by creating a 5x5 grid, known as the Polybius square, is created. The letters of the alphabet (excluding 'J' in most cases) are arranged in the grid, typically starting with 'A' and ending with 'Z', omitting 'J'.",\
|
||||||
"Each letter of the plaintext is first converted into its corresponding row and column numbers in the grid. For example, the letter 'C' may correspond to the row 1, column 3. These numerical representations are then combined into pairs of numbers.",\
|
"Each letter of the plaintext is first converted into its corresponding row and column numbers in the grid. For example, the letter 'C' may correspond to the row 1, column 3. These numerical representations are then combined into pairs of numbers.",\
|
||||||
@@ -212,7 +212,7 @@ cipher.poly.morse.name=Morse Code
|
|||||||
cipher.poly.morse.description=Morse code is a method of transmitting text information as a series of on-off tones, lights, or clicks, with each character represented by a unique sequence of dots and dashes.
|
cipher.poly.morse.description=Morse code is a method of transmitting text information as a series of on-off tones, lights, or clicks, with each character represented by a unique sequence of dots and dashes.
|
||||||
cipher.poly.morse.explanation={\
|
cipher.poly.morse.explanation={\
|
||||||
"Morse code is a method of transmitting text information as a series of on-off tones, lights, or clicks. Morse code encodes characters (letters, numbers, and punctuation) as sequences of dots (short signals) and dashes (long signals) arranged in specific patterns.",\
|
"Morse code is a method of transmitting text information as a series of on-off tones, lights, or clicks. Morse code encodes characters (letters, numbers, and punctuation) as sequences of dots (short signals) and dashes (long signals) arranged in specific patterns.",\
|
||||||
"The basic elemens of Morse Code are dots and dashes. Each letter, number, or punctuation mark is represented by a unique combination of dots and dashes. Numbers and punctuation marks also have their own Morse code representations.",\
|
"The basic elements of Morse Code are dots and dashes. Each letter, number, or punctuation mark is represented by a unique combination of dots and dashes. Numbers and punctuation marks also have their own Morse code representations.",\
|
||||||
"Morse code has been widely used in various forms of communication, including telegraphy, radio communication, aviation, and navigation. Despite advances in technology, Morse code remains relevant today, particularly in emergency communication, amateur radio, and certain military applications. It is also used by some individuals for its simplicity and effectiveness in situations where other forms of communication may be unreliable or unavailable."\
|
"Morse code has been widely used in various forms of communication, including telegraphy, radio communication, aviation, and navigation. Despite advances in technology, Morse code remains relevant today, particularly in emergency communication, amateur radio, and certain military applications. It is also used by some individuals for its simplicity and effectiveness in situations where other forms of communication may be unreliable or unavailable."\
|
||||||
}
|
}
|
||||||
cipher.poly.morse.facts={\
|
cipher.poly.morse.facts={\
|
||||||
@@ -272,9 +272,9 @@ cipher.poly.railfence.facts={\
|
|||||||
cipher.poly.trifid.name=Trifid
|
cipher.poly.trifid.name=Trifid
|
||||||
cipher.poly.trifid.description=The Trifid cipher is a polygraphic substitution cipher substituting each letter in the plaintext with coordinates in a 3x3x3 grid.
|
cipher.poly.trifid.description=The Trifid cipher is a polygraphic substitution cipher substituting each letter in the plaintext with coordinates in a 3x3x3 grid.
|
||||||
cipher.poly.trifid.explanation={\
|
cipher.poly.trifid.explanation={\
|
||||||
"The trifid cipher is a polygraphic substitution cipher and is an extention of the Bifid cipher.",\
|
"The trifid cipher is a polygraphic substitution cipher and is an extension of the Bifid cipher.",\
|
||||||
"To encode, a key matrix is generated, typically a permutation of the alphabet plus some additional symbols. Each letter of the plaintext is converted into its corresponding coordinates in the 3x3x3 grid. For example, if the letter is 'A', it could be represented as (1,1,1).",\
|
"To encode, a key matrix is generated, typically a permutation of the alphabet plus some additional symbols. Each letter of the plaintext is converted into its corresponding coordinates in the 3x3x3 grid. For example, if the letter is 'A', it could be represented as (1,1,1).",\
|
||||||
"The coordinates are then rearranged according to the key matrix and teh plaintext coordinate is (1,1,1), in might be rearranged to 2,3,1 based on the position of 'A' in the key matrix. The rearranged coordinates are converted back into letters.",\
|
"The coordinates are then rearranged according to the key matrix and the plaintext coordinate is (1,1,1), it might be rearranged to 2,3,1 based on the position of 'A' in the key matrix. The rearranged coordinates are converted back into letters.",\
|
||||||
"The process is reversed. The ciphertext is first converted into coordinates, rearranged back using the key matrix, and then converted back into plaintext.",\
|
"The process is reversed. The ciphertext is first converted into coordinates, rearranged back using the key matrix, and then converted back into plaintext.",\
|
||||||
"The Trifid cipher provides a higher degree of security compared to simpler ciphers like Caesar or Atbash, but it's still vulnerable to cryptanalysis, especially with modern computational methods. Despite its age, it remains an interesting historical cipher and is occasionally used in puzzles and cryptography challenges."\
|
"The Trifid cipher provides a higher degree of security compared to simpler ciphers like Caesar or Atbash, but it's still vulnerable to cryptanalysis, especially with modern computational methods. Despite its age, it remains an interesting historical cipher and is occasionally used in puzzles and cryptography challenges."\
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user