Cryptography: The Science of Making and Breaking Codes

There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it's tough to make a code truly unbreakable.

Cryptography Lesson #1 - Block Ciphers

This tutorial video will help provide an understanding of what block ciphers are, and how they are used in the field of cryptography.

Top 10 Uncracked Codes and Ciphers

Not even the greatest minds of the world could decipher these codes. Join as we count down our picks for the Top 10 Uncracked ...

DaBaby, Megan Thee Stallion, YK Osiris and Lil Mosey's 2019 XXL Freshman Cypher

Subscribe to XXL → DaBaby, Megan Thee Stallion, YK Osiris and Lil Mosey bring the heat in their 2019 XXL Freshman cypher.

Famous UNCRACKED Codes That STILL Exist!

Check out these famous uncracked codes that still exist! From secret riddles to unsolved mysteries, this top 10 list contains cryptography that's still unexplained ...

Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is spelled incorrectly on the ...

How To Write In Templar Cipher

In this cipher tutorial, I teach you guys how to write in Templar Cipher. This cipher is formed using a variant of the Maltese Cross, and is rumored to have been ...

Playfair Cipher

An explanation with examples of how to encode and decode messages with the Playfair Cipher.

Inq's Cipher Wheel

Get your own Inq's Cipher Wheel and everything else in Box VIII: ...

What Are AEAD Ciphers?

The recent TLS 1.3 protocol mandates that Authenticated Encryption with Associated Data (AEAD) Ciphers be used for bulk encryption. As web servers and ...

Cryptography 101 - - XOR Cipher

XOR ciphers take advantage of Ascii encoding and basic bit switching operations. They are extremely fast, but not particularly secure when used alone, without ...

Playfair Cipher Explained

An animated attempt of explaining the Playfair cipher. This tutorial includes rules of the cipher followed by an example to clear things up. This was a part of my ...

Cryptography 101 - Substitution Ciphers

In this video we look at substitution ciphers: how they are made and how to break them.

Creating An Unbreakable Cipher (nearly)

Creating Ciphers can be fun, but understanding how they work by using a simple example of developing a cipher is a great way to understand them. This video ...

Transposition Ciphers - Encryption/Decryption

A beginner's guide to Transposition Ciphers (Encryption/Decryption).

What is Zodiac's 340-Character Cipher? 2018 ACA Presentation

This is my talk given on September 8, 2018 at the annual convention of the American Cryptogram Association in Hendersonville, NC. In it I try to talk about all the ...

Ciphers, Codemakers & Codebreakers (National Treasure documentary)

Excerpt from documentary made for the National Treasure DVD.


How To Write in Pigpen Cipher [2 MINUTE TUTORIAL]

Pigpen cipher - also known as masonic cipher, Freemason's cipher, Napoleon cipher, and tic-tac-toe cipher - is a geometric substitution cipher based off of 4 ...

The World's Greatest Unsolved Ciphers, part 1 - Prof Craig Bauer

Speaker: Prof. Craig Bauer (York College, PA) Title: The World's Greatest Unsolved Ciphers Date: Wednesday, 24-Apr-2013 This is part 1. Abstract: Ciphers that ...

The Zodiac Ciphers - What do we know, and when do we stop trying to solve them? This is a talk I gave at the 2015 Cryptologic History Symposium on October 22, 2015. I've been studying the Zodiac ciphers for a ...

Vigenere Cipher 1

Encrypt the message MAKE IT HAPPEN using the Vigenėre cipher and key word MATH.

Lecture 3: Stream Ciphers, Random Numbers and the One Time Pad by Christof Paar

For slides, a problem set and more on learning cryptography, visit

Block Ciphers and DES (CSS441, L05, Y15)

Stream vs block ciphers; ideal block cipher and Feistel structure; example of Simplified-DES. Course material via:

caesar cipher encryption and decryption example

a Caesar cipher,is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is ...


1. Electronic Code Book Mode 2. Cipher Block Chaining Mode 3. Output Feedback Mode 4. Cipher Feedback Mode 5. Counter Mode.