Cipher | Definition, Types, & Facts (2024)

cryptology

verifiedCite

While every effort has been made to follow citation style rules, there may be some discrepancies.Please refer to the appropriate style manual or other sources if you have any questions.

Select Citation Style

External Websites

Britannica Websites

Articles from Britannica Encyclopedias for elementary and high school students.

  • ciphers and codes - Student Encyclopedia (Ages 11 and up)

Print

verifiedCite

While every effort has been made to follow citation style rules, there may be some discrepancies.Please refer to the appropriate style manual or other sources if you have any questions.

Select Citation Style

Feedback

Thank you for your feedback

Our editors will review what you’ve submitted and determine whether to revise the article.

External Websites

Britannica Websites

Articles from Britannica Encyclopedias for elementary and high school students.

  • ciphers and codes - Student Encyclopedia (Ages 11 and up)

Also known as: cipher system, cryptosystem, single-key cryptography

Written and fact-checked by

The Editors of Encyclopaedia Britannica Encyclopaedia Britannica's editors oversee subject areas in which they have extensive knowledge, whether from years of experience gained by working on that content or via study for an advanced degree. They write new content and verify and edit content received from contributors.

The Editors of Encyclopaedia Britannica

Article History

ADFGVX cipher

See all media

Key People:
Agnes Meyer Driscoll
Related Topics:
Data Encryption Standard
public-key cryptography
transposition cipher
substitution cipher
product cipher

See all related content →

cipher, any method of transforming a message to conceal its meaning. The term is also used synonymously with ciphertext or cryptogram in reference to the encrypted form of the message. A brief treatment of ciphers follows. For full treatment, see cryptology.

All ciphers involve either transposition or substitution, or a combination of these two mathematical operations—i.e., product ciphers. In transposition cipher systems, elements of the plaintext (e.g., a letter, word, or string of symbols) are rearranged without any change in the identity of the elements. In substitution systems, such elements are replaced by other objects or groups of objects without a change in their sequence. In systems involving product ciphers, transposition and substitution are cascaded; for example, in a system of this type called a fractionation system, a substitution is first made from symbols in the plaintext to multiple symbols in the ciphertext, which is then superencrypted by a transposition. All operations or steps involved in the transformation of a message are carried out in accordance to a rule defined by a secret key known only to the sender of the message and the intended receiver.

Britannica QuizCodes, Secrets, and Ciphers Quiz

Cipher devices or machines have commonly been used to encipher and decipher messages. The first cipher device appears to have been employed by the ancient Greeks around 400 bce for secret communications between military commanders. This device, called the scytale, consisted of a tapered baton around which was spirally wrapped a piece of parchment inscribed with the message. When unwrapped the parchment bore an incomprehensible set of letters, but when wrapped around another baton of identical proportions, the original text reappeared. Other simple devices known as cipher disks were used by European governments for diplomatic communications by the late 1400s. These devices consisted of two rotating concentric circles, both bearing a sequence of 26 letters. One disk was used to select plaintext letters, while the other was used for the corresponding cipher component.

In 1891 Étienne Bazeries, a French cryptologist, invented a more sophisticated cipher device based on principles formulated by Thomas Jefferson of the United States nearly a century earlier. Bazeries’s so-called cylindrical cryptograph was made up of 20 numbered rotatable disks, each with a different alphabet engraved on its periphery. The disks were arranged in an agreed-upon order on a central shaft and rotated so that the first 20 letters of the message plaintext appeared in a row; the ciphertext was then formed by arbitrarily taking off any other row. The remaining letters of the message were treated in the same way, 20 letters at a time.

Advances in radio communications and electromechanical technology in the 1920s brought about a revolution in cryptodevices—the development of the rotor cipher machine. One common type of rotor system implemented product ciphers with simple monoalphabetic substitution ciphers as factors. The rotors in this machine consisted of disks with electrical contacts on each side that were hardwired to realize an arbitrary set of one-to-one connections (monoalphabetic substitution) between the contacts on opposite sides of the rotor.

The rotor cipher machine was used extensively by both the Allied and the Axis powers during World War II, with the most notable such device being the German Enigma machine. The application of electronic components in subsequent years resulted in significant increases in operation speed though no major changes in basic design. Since the early 1970s, cryptologists have adapted major developments in microcircuitry and computer technology to create new, highly sophisticated forms of cryptodevices and cryptosystems, as exemplified by the Fibonacci generator and the implementation of the Data Encryption Standard (DES) through the use of microprocessors.

The Editors of Encyclopaedia BritannicaThis article was most recently revised and updated by Erik Gregersen.

Cipher | Definition, Types, & Facts (2024)
Top Articles
What Franchisors Need to Know About Working with Franchise Brokers
Guide to Refinancing Student Loans Without a Cosigner | SoFi
Koopa Wrapper 1 Point 0
Craigslist Motorcycles Jacksonville Florida
Ventura Craigs List
O'reilly's In Monroe Georgia
Bubbles Hair Salon Woodbridge Va
Craigslist/Phx
Missing 2023 Showtimes Near Landmark Cinemas Peoria
Santa Clara Valley Medical Center Medical Records
FAQ: Pressure-Treated Wood
Job Shop Hearthside Schedule
7440 Dean Martin Dr Suite 204 Directions
Craigslist Edmond Oklahoma
Committees Of Correspondence | Encyclopedia.com
Invert Clipping Mask Illustrator
Charter Spectrum Store
Apply for a credit card
Craigslist Appomattox Va
Aldi Bruce B Downs
Hobby Stores Near Me Now
MyCase Pricing | Start Your 10-Day Free Trial Today
Redfin Skagit County
Ltg Speech Copy Paste
Dove Cremation Services Topeka Ks
Panolian Batesville Ms Obituaries 2022
Times Narcos Lied To You About What Really Happened - Grunge
Select The Best Reagents For The Reaction Below.
UPC Code Lookup: Free UPC Code Lookup With Major Retailers
1475 Akron Way Forney Tx 75126
Kaiserhrconnect
Craigslist Red Wing Mn
1-800-308-1977
Jennifer Reimold Ex Husband Scott Porter
Terrier Hockey Blog
Empire Visionworks The Crossings Clifton Park Photos
Chuze Fitness La Verne Reviews
Admissions - New York Conservatory for Dramatic Arts
Conroe Isd Sign In
Froedtert Billing Phone Number
Gamestop Store Manager Pay
Yakini Q Sj Photos
Child care centers take steps to avoid COVID-19 shutdowns; some require masks for kids
Matt Brickman Wikipedia
Keci News
877-552-2666
New Zero Turn Mowers For Sale Near Me
Wild Fork Foods Login
Overstock Comenity Login
Southern Blotting: Principle, Steps, Applications | Microbe Online
Texas Lottery Daily 4 Winning Numbers
Latest Posts
Article information

Author: Fredrick Kertzmann

Last Updated:

Views: 6610

Rating: 4.6 / 5 (46 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Fredrick Kertzmann

Birthday: 2000-04-29

Address: Apt. 203 613 Huels Gateway, Ralphtown, LA 40204

Phone: +2135150832870

Job: Regional Design Producer

Hobby: Nordic skating, Lacemaking, Mountain biking, Rowing, Gardening, Water sports, role-playing games

Introduction: My name is Fredrick Kertzmann, I am a gleaming, encouraging, inexpensive, thankful, tender, quaint, precious person who loves writing and wants to share my knowledge and understanding with you.