Saturday, September 10, 2011

Make A Cipher: A Winding Way

How to Encrypt a Winding Way Cipher

Step 1
Write down your PLAINTEXT message on a piece of paper without any spaces between the words.

Count the number of letters used in the message.

Step 2
Create a MATRIX, or grid, that is large enough to contain your message.

In our example, the message has 22 letters and uses a 4x6 matrix (4 squares wide by 6 squares high), but we could have used a matrix that was 5x5.

Step 3
Writing from left to right, fill in the boxes of the matrix.

Use a NULL to fill in any remaining boxes in the matrix.

Step 4
Determine the shape of the pattern, or path, you will use to encrypt the plaintext.

Patterns can start in any corner of the matrix and then move up or down, left or right, diagonally, zig-zag, or spiral throughout the grid.

Step 5
Draw the pattern lightly over the matrix and then copy the letters as they appear on your chosen path.

You have created a Winding Way Cipher!

How to Decrypt a Winding Way Cipher

Step 1
Using the KEY (the number of squares and the type of pattern used to make the grid) that your friend gave you, draw a matrix and fill in the boxes with the CIPHERTEXT.

If there are any empty boxes remaining, use NULLS to fill them in.

Step 2
Reading from left to right, you can now read the plaintext message.

You have deciphered a Winding Way Cipher!


Post a Comment

Share our post if you like it..

Related Posts Plugin for WordPress, Blogger...

IP info



study (19) education (18) coding (11) Codes (9) ciphers (9) cryptology (9) CRYPTOGRAPHY (8) Hacking Tutorials (5) Ethical hacker/hacking (4) Exploits and Incident Handling (4) HACKING WINDOWS (4) Make A Cipher (4) Windows (4) password breakers/crackers (4) Dictionary (3) Ebook (3) Facebook (3) Facebook Emoticons (3) Google Dork (3) Google Hacks (3) facebook symbols (3) php hack (3) tools (3) ASCII art (2) Facebook Animated Gif Image Status (2) GRE (2) GRE Dictionary (2) Hack a Website (2) IELTS (2) Java: A Beginner's Guide (2) Password Cracking (2) Password Recovery (2) SOCIAL ENGINEERING TOOLKIT (2) Session hijacking (2) find the vulnerability (2) java (2) password-auditing (2) password-cracker (2) php (2) Abel (1) Backtrack 5 (1) Barron’s GRE word list (1) Breaking Ciphers (1) CIPHERTEXT (1) CRYPTANALYSIS (1) Caesar's Shift Cipher (1) Cain (1) Cain and Abel (1) Crypters Binders RC4 (1) DOS (1) Facebook Chat Text Generator (1) Fast leech generator (1) Hacking Tools (1) HconSTF (1) List of best anonymizers (1) Make fake virus (1) Number Shift Cipher (1) One Pig's Pen (1) RFI (1) Remote file inclusion (1) SEO (1) SQL injection (1) Security 504 Hacker Techniques (1) Steal/trace ip (1) The Key (1) The Rail Fences (1) Toefl (1) Uses of proxy server (1) Virus (1) Vocabulary Word List (1) Winding Way Cipher (1) blog tips (1) brute force (1) brute forcing. (1) brutus (1) brutus-aet2 (1) (1) brutus-password-cracker (1) bypass web-filters (1) chat (1) command prompt (1) cookie stealing (1) crackers (1) e (1) fast download (1) hacking-software (1) hot file (1) improve site (1) ip catcher (1) ip tracker (1) leech (1) leecher (1) list of proxy servers (1) mail (1) mega upload (1) mobile (1) network-sniffing (1) rapid share (1) regular download link into premium (1) serial keys 94fbr (1) symbols (1) th3j35t3r's DOS tool (1)



☁ Partners Link Cloud ☁