Skip to main content
CipherChronicle

The universes of cryptography 37 methods

The great classics of cryptography

Caesar, Vigenère, Atbash, Enigma: the founding ciphers that shaped two thousand years of secret writing, from Roman generals’ dispatches to the rotor machines of the Second World War.

Spotlight cipher

Caesar cipher

A fixed alphabet shift. The classic — easy to grasp, easy to break.

Substitution ~50 BCE, Ancient Rome Julius Caesar
See the page

A school for sharpening intuition

No one becomes a cryptographer by starting with AES. You learn first to spot a letter that recurs too often, to try a shift, to sense that a keyword might drive the transformation. The great classics are the ciphers that have taught that intuition to generations of amateur cryptanalysts.

They are simple to explain, pedagogically perfect, and every single one of them can be cracked by hand with pencil, paper and patience.

From Caesar to Vigenère: two thousand years of shifts

The Caesar cipher (around 50 BC) opens the show: shift each letter by a fixed number. Three little rules, twenty-five useful keys, broken in under a minute. A thousand years later, Atbash (12th-century Hebrew manuscripts) plays with involution — A becomes Z, B becomes Y, and encryption looks exactly like decryption.

The Renaissance adds two masterpieces: Alberti invents the rotating disk (1467), Trithemius makes the shift progressive (1508), and Vigenère brings it all together in 1586 with his famous tableau and his keyword. For two centuries Vigenère is nicknamed "the indecipherable cipher" — until Babbage in 1854 and Kasiski in 1863 show how to read the key length from the repetitions in the ciphertext.

The industrial turn: Playfair, Hill, Enigma

The 19th and early 20th centuries pile on refinements: Playfair encrypts letter pairs, Hill brings in matrices and linear algebra, Bacon smuggles binary into typography long before the term existed, Polybius lays the alphabet out in a grid for tap-code transmission.

Everything converges toward mechanisation. Jefferson assembles his disks in 1795, Enigma automates alphabet rotation from 1923, Chaocipher invents a cardan mechanism in 1918. The cryptanalysts at Bletchley Park will break Enigma from 1939 onwards — not thanks to an obvious mathematical flaw, but by exploiting operational mistakes (reused keys, known plaintext "cribs", stereotyped openings).

Why study them today?

All these ciphers share a quality modern algorithms have lost: they are legible. You can trace the path of a letter by hand, understand exactly why one choice strengthens security and another weakens it, and feel the beauty of a system that fits on a sheet of paper.

That is why CipherChronicle puts them at the heart of its workshop: every great classic has its page, its animated demo, its two-click encrypt/decrypt, and its history told like a novel.

And the rarer variants?

As you explore the universe, you will also meet rarer cousins: ROT-13 that turns Vigenère into an involution, Beaufort that flips the sign, Autokey that feeds itself from the plaintext, Porta that splits the alphabet across two disks, or Bifid and Trifid that marry grid and transposition.

Each of them has a place in the pantheon because it taught a new idea. And every one of them is attackable — which is exactly why they remain the bedrock of every cryptography course.

Catalogue

Methods in this universe

37 methods