# CrypTool-Online

### Ciphers 24

ADFG(V)X

Cipher from WW1, which substitutes and transposes

AES (step-by-step)

The most common modern encryption method

ATBASH

Simple monoalphabetic substitution cipher originally used on the Hebrew alphabet

Autokey

Variant of Vigenère, which also uses plaintext as key

Beaufort

Vigenère cipher, which uses reversed alphabet

Bit Shift

Caesar / Rot13

Shifting cipher, which was used by Julius Caesar

Enigma (step-by-step)

World War 2 rotor encryption machine

Gronsfeld

Hill

Polygraphic substitution, based on linear algebra

Kamasutra

Monoalphabetic Substitution

Cipher that replaces letters with letters/characters

Multiplicative

Simplified variant of the affine cipher

Porta

Vigenère cipher with half the key space

Rail fence

Transposition cipher that uses a railfence pattern

Redefence

Railfence cipher that reads lines in any order

Rotation

Cipher writes plaintext in blocks and rotates them

RSA (step-by-step)

The most widespread asymmetric method for encryption and signing

Scytale

Cipher that writes messages on a belt

Simple Column Transposition

Cipher that interchanges lines of the plaintext

Trithemius

Precursor of the Vigenère tableau (with fixed key)

Vernam

Using XOR for implementing a one-time pad (OTP)

Vigenère

First strong polyalphabetic cipher

XOR

Single bits are XORed (typical component of more complex ciphers)

### Codings 6

ASCII

Letters are replaced by numbers of the ASCII code

Bacon

Coding that encrypts and hides letters in sentences

Barcode

Characters are encoded by strokes of different thicknesses

Base64

Coding, which is based on a 64 number system

Huffman

Encodes characters with minimal long binary words

Morse Code

Encodes letters using dashes and dots

### Cryptanalysis 7

Tabular N-gram Analysis

Counts and visualizes the number of n-grams

Autocorrelation

Correlates text with shifted versions of itself

Vigenère Analysis

Determines the length of the key of a Vigenère cipher

Graphical Frequency Analysis

N-gram analysis that works interactively and graphically

Distributed AES Analysis

Demo attacking AES with distributed computing

Number Converter

Converts numbers to various other number systems

NCID

Identifies the cipher type, with only a short given ciphertext

### Highlights 7

Password Meter

Evaluates the strength of an entered password locally

Password Check

Another local password evaluation algorithm

Password Generator

Local generation of random passwords

Msieve Factorizer

Factorization of large numbers using a quadratic sieve

Corona Tracing

Demonstration of the cryptographic protocol DP-3T

OpenSSL

Ported to the web browser with WebAssembly

AES Animation

Interactive animation of the AES algorithm

nothing found ¯\_(ツ)_/¯