Saturday, September 10, 2011

Make A Cipher: Number Shift Cipher

How to Encrypt a Number Shift Cipher

Step 1
Write down your PLAINTEXT message on a piece of paper.

Step 2
Create a 5x5 grid, also known as a Polybius Grid, on your paper.

Make sure your grid has 25 squares when you are finished.

Step 3
Write the numbers 1 thru 5 down the left side of the grid and across the top of the grid as well.

Beginning with the letter A, fill in the squares with the letters of the alphabet. Because there are only 25 squares, cryptanalysts usually put the letters Y and Z together in the last square.

Step 4
Begin encrypting your message by locating the first letter of your plaintext message in the grid.

Write down the row number followed by the column number.

In our example, the T will be encrypted as the number 45.

Step 5
Continue until your entire message has been encrypted.

To make your message more secure, leave out the spaces between each word.

You have created a Number Shift Cipher!

How to Decrypt a Number Shift Cipher

Step 1
Based on the KEY provided by the sender, create a 5x5 grid (Polybius Grid). Label the rows 1 thru 5 down the left side of the grid and the columns 1 thru 5 across the top.

Step 2
Once you have created the grid, fill in the squares with the letters of the alphabet. Because there are only 25 squares and 26 letters, remember to put Y and Z in the same square at the bottom of the grid.

Step 3
To begin decrypting the ciphertext, take the first number from the message and examine the number's two digits. The first digit is the row number and the second digit is the column number.

Write the letter that appears at the intersection of the specific row and column on the grid.

Step 4
Continue decrypting the ciphertext until your message is revealed.

You have learned how to decrypt a Number Shift Cipher!


Post a Comment

Share our post if you like it..

Related Posts Plugin for WordPress, Blogger...

IP info



study (19) education (18) coding (11) Codes (9) ciphers (9) cryptology (9) CRYPTOGRAPHY (8) Hacking Tutorials (5) Ethical hacker/hacking (4) Exploits and Incident Handling (4) HACKING WINDOWS (4) Make A Cipher (4) Windows (4) password breakers/crackers (4) Dictionary (3) Ebook (3) Facebook (3) Facebook Emoticons (3) Google Dork (3) Google Hacks (3) facebook symbols (3) php hack (3) tools (3) ASCII art (2) Facebook Animated Gif Image Status (2) GRE (2) GRE Dictionary (2) Hack a Website (2) IELTS (2) Java: A Beginner's Guide (2) Password Cracking (2) Password Recovery (2) SOCIAL ENGINEERING TOOLKIT (2) Session hijacking (2) find the vulnerability (2) java (2) password-auditing (2) password-cracker (2) php (2) Abel (1) Backtrack 5 (1) Barron’s GRE word list (1) Breaking Ciphers (1) CIPHERTEXT (1) CRYPTANALYSIS (1) Caesar's Shift Cipher (1) Cain (1) Cain and Abel (1) Crypters Binders RC4 (1) DOS (1) Facebook Chat Text Generator (1) Fast leech generator (1) Hacking Tools (1) HconSTF (1) List of best anonymizers (1) Make fake virus (1) Number Shift Cipher (1) One Pig's Pen (1) RFI (1) Remote file inclusion (1) SEO (1) SQL injection (1) Security 504 Hacker Techniques (1) Steal/trace ip (1) The Key (1) The Rail Fences (1) Toefl (1) Uses of proxy server (1) Virus (1) Vocabulary Word List (1) Winding Way Cipher (1) blog tips (1) brute force (1) brute forcing. (1) brutus (1) brutus-aet2 (1) (1) brutus-password-cracker (1) bypass web-filters (1) chat (1) command prompt (1) cookie stealing (1) crackers (1) e (1) fast download (1) hacking-software (1) hot file (1) improve site (1) ip catcher (1) ip tracker (1) leech (1) leecher (1) list of proxy servers (1) mail (1) mega upload (1) mobile (1) network-sniffing (1) rapid share (1) regular download link into premium (1) serial keys 94fbr (1) symbols (1) th3j35t3r's DOS tool (1)



☁ Partners Link Cloud ☁