Saturday, September 10, 2011

Make A Cipher: The Rail Fences


Make A Cipher: The Rail Fences

How to Encrypt a Rail Fence Cipher

Step 1
Write down your PLAINTEXT message on a piece of paper.


Then write each letter of the plaintext on two separate lines - the first letter goes on the first line, the second on the second line, the third letter goes back on the first line, and so on.

Step 2
Count the total number of letters used.


The total number of letters should equal a multiple of 4 (8, 12, 16, 20). If not, you will need to add extra letters, called NULLS, until it is a multiple of 4.

Step 3
Beginning with Line 1, combine the letters from both lines to create your CIPHERTEXT.


Divide the letters into as many groups as you like.

CONGRATULATIONS! 
You have successfully created a RAIL FENCE CIPHER!





How to Decrypt a Rail Fence Cipher

Step 1
Divide the letters in half by drawing a line through the ciphertext.


Write the first half of the message on one line and the second half on a new line beneath it. Make sure you leave a space between each letter.

Step 2
Rewrite the message by combining letters from Line 1 and Line 2.


Make sure that you alternate between lines and leave out any NULLS that are included at the end.

CONGRATULATIONS! 
You have successfully deciphered a RAIL FENCE CIPHER!

0 comments:

Post a Comment

Share our post if you like it..

Related Posts Plugin for WordPress, Blogger...

IP info

hAckRich

Tags

study (19) education (18) coding (11) Codes (9) ciphers (9) cryptology (9) CRYPTOGRAPHY (8) Hacking Tutorials (5) Ethical hacker/hacking (4) Exploits and Incident Handling (4) HACKING WINDOWS (4) Make A Cipher (4) Windows (4) password breakers/crackers (4) Dictionary (3) Ebook (3) Facebook (3) Facebook Emoticons (3) Google Dork (3) Google Hacks (3) facebook symbols (3) php hack (3) tools (3) ASCII art (2) Facebook Animated Gif Image Status (2) GRE (2) GRE Dictionary (2) Hack a Website (2) IELTS (2) Java: A Beginner's Guide (2) Password Cracking (2) Password Recovery (2) SOCIAL ENGINEERING TOOLKIT (2) Session hijacking (2) find the vulnerability (2) java (2) password-auditing (2) password-cracker (2) php (2) Abel (1) Backtrack 5 (1) Barron’s GRE word list (1) Breaking Ciphers (1) CIPHERTEXT (1) CRYPTANALYSIS (1) Caesar's Shift Cipher (1) Cain (1) Cain and Abel (1) Crypters Binders RC4 (1) DOS (1) Facebook Chat Text Generator (1) Fast leech generator (1) Hacking Tools (1) HconSTF (1) List of best anonymizers (1) Make fake virus (1) Number Shift Cipher (1) One Pig's Pen (1) RFI (1) Remote file inclusion (1) SEO (1) SQL injection (1) Security 504 Hacker Techniques (1) Steal/trace ip (1) The Key (1) The Rail Fences (1) Toefl (1) Uses of proxy server (1) Virus (1) Vocabulary Word List (1) Winding Way Cipher (1) blog tips (1) brute force (1) brute forcing. (1) brutus (1) brutus-aet2 (1) brutus-aet2.zip (1) brutus-password-cracker (1) bypass web-filters (1) chat (1) command prompt (1) cookie stealing (1) crackers (1) e (1) fast download (1) hacking-software (1) hot file (1) improve site (1) ip catcher (1) ip tracker (1) leech (1) leecher (1) list of proxy servers (1) mail (1) mega upload (1) mobile (1) network-sniffing (1) rapid share (1) regular download link into premium (1) serial keys 94fbr (1) symbols (1) th3j35t3r's DOS tool (1)

Hackrich

welcome

☁ Partners Link Cloud ☁