Cryptography Methods
Classical Ciphers (Pre-20th Century)
Caesar Cipher
Atbash Cipher
Affine Cipher
Simple Substitution Cipher
Homophonic Substitution Cipher
Vigenère Cipher
Beaufort Cipher
Autokey Cipher
Scytale
Rail Fence Cipher
Columnar Transposition
Route Cipher
Book Cipher
Grille Cipher
Pigpen Cipher
Playfair Cipher
Early 20th Century
Enigma Machine
SIGABA
Typex
Hebern Rotor Machine
Hagelin M-209
One-time Pad
Double Transposition Cipher
ADFGVX Cipher
World War II & Early Computer Era
Lorenz Cipher
SIGSALY
DES (1977)
Lucifer
Diffie-Hellman Key Exchange
RSA
Merkle-Hellman Knapsack
Modern Cryptography
Symmetric-Key Algorithms
DES (Modern Context)
Triple DES
AES
Blowfish & Twofish
IDEA
Serpent, RC5, RC6, CAST
RC4
Salsa20 & ChaCha20
A5/1 & A5/2
Public-Key Cryptography
ECC (ECDSA, ECDH)
ElGamal Encryption
DSA
CRYSTALS-Kyber
CRYSTALS-Dilithium
Falcon, SPHINCS+
NTRU, McEliece
Hash Functions
Hash Functions
MD5
SHA-1
SHA-2
SHA-3
BLAKE2 & BLAKE3
HMAC
Poly1305
Key Exchange Protocols
Diffie-Hellman
Post-Quantum Key Exchange
Secure Remote Password (SRP)
SHELLZERO Cryptography Learning Platform
Select a cipher from the left to begin