Skip to main content

Cipher algorithm in Cryptography

Cipher algorithm in Cryptography



Cipher algorithm in Cryptography - Cipher is an algorithm or procedure for creating encryption or decryption code used in Cryptography. It is a series of steps that can be followed to creating codes. It is a method of transforming a message to conceal its meaning. TLS/SSL specification defines many possible ciphers which can be used to encrypt data. A cipher is where a message is made by substituting one symbol for a letter. The common types of cipher are Alphabet Ciphers, Math based ciphers, Null Cipher, Substitution cipher, Transposition cipher, Playfair cipher, Running key cipher and others.


What are the Popular Types of Cipher?




  1. Pigpen Cipher – It is a very simple substitution cipher. It was used in the 18th century. It is also called as masonic cipher. It is also called as Tic-Tac-Toe cipher. The letters of the alphabet are replaced by fragments of a geometrical grid.

  2. Ceasar Cipher – It is a substitution cipher where letters are substituted by a letter with a fixed shift in the alphabet. It is also called as shift cipher. This particular cipher is not very difficult to decipher and hence secret messages do not remain secret for long. It was named after Julius Caesar.

  3. Book Cipher – Book ciphers are a different kind of secret code. It uses a very common article as key. The concept behind book cipher is that it transmit the location code (which are needed to find out specific word in the book). Here the location in the book are used to replace the plain text of the message.

  4. Vigenere Cipher – It is the oldest way of coding which are designed to mask character frequency.

  5. Enigma code – It was used by Germans during the Second World War. There could be over trillions of possible configurations and hence was difficult to decipher Enigma. It involved using an Enigma machine, which is similar to the type writer. All Germans had the same Enigma machine and the initial wheel configuration of the machine was communicated to all the teams.

  6. Transposition Cipher - The letters of the alphabet are rearranged based on pre-determined key or rule. It was used during American Civil war and World War I to communicate each other.

Popular posts from this blog

When Task Scheduler gets Infected by Malware

When Task Scheduler gets Infected by Malware

When Task Scheduler gets Infected by Malware - We are familiar with malware attacks on Computer. The hackers infect one or more files and thereby attaining full control on the System. There are millions of victims who had loosen either data or dollars in this respect. In this article we see a System file which is infected by these hackers at first stage. The System file infected by malware at first stage is Task Scheduler Engine (Taskeng.exe). The Task Scheduler Engine is a system file located in C:\Windows\System32 folder. This location is the default location for Taskeng.exe.



The Task Scheduler Engine is responsible for keeping track of tasks set to run at a time predefined by the user of the PC. As said earlier, the original location of this scheduler is C:\Windows\System32 folder. But it is suspicious if the location of scheduler gets change. If it is found in some other folder then it must be infectious. As a result, you constantly get a…

How to Project Android Phone Screen on Windows PC

How to Project Android Phone Screen on Windows PC


Project Android Phone Screen on Windows PC - Four out of Five of us have Smartphones in our Pocket. We spend lots of time on Smartphone utilities like Facebook, Twitter, WhatsApp, YouTube and other interesting Apps. These Smartphones are tremendously used due to Android Operating System installed in it. Android OS is one the successful mobile based OS running in the market.

On the Other side, Microsoft is emphasizing on features to ease Android user's connectivity with it. Microsoft has done lots of improvement for mobile utilities to the Windows 10 version 1809. With this upgradation, we can easily project Android phone screen on Windows PC. The extensive use of such features is seen on Digital Smart TVs Today. The introduction of Wi-Fi feature makes more reliable and user friendly.

So, if you are boredom with 5-6-inch Android Screen and want to mirror it on Computer screen, then read the full article to know the process, how to proj…

Fix Windows could not find a driver for your network adapter error

Fix Windows could not find a driver for your network adapter error


A Computer run smoothly with the coordination of Software & Hardware. In the absence of any one it will not run at all. Software being the Master utilizes each hardware attached to the System. And each hardware is operated with the help of Device Drivers installed in it. Operating System (OS) uses these device drivers to control & utilize each hardware when needed. Each hardware connected to the system must have their own Device Driver installed. A device driver is a program to initiate a hardware when required by Operating System.




Suppose, you want your PC to connect to the Network, it can only be possible when your PC has network related Device Driver. These Device Drivers are easily downloaded from Manufacturer Websites. In this article we focus on Network related problem. Suppose, your PC not obtaining Network connectivity. And each time you are getting an error message saying "Windows could not find a d…