Learn Cryptography

Explore the fascinating world of classical cryptography with comprehensive tutorials, guides, and interactive examples

Cipher Categories

Caesar Cipher

21 articles

Articles about Caesar cipher and shift-based encryption methods

Explore caesar cipher tutorials and guides

Vigenère Cipher

1 article

Polyalphabetic substitution cipher tutorials and guides

Explore vigenère cipher tutorials and guides

Playfair Cipher

1 article

Digraph substitution cipher implementation and analysis

Explore playfair cipher tutorials and guides

Affine Cipher

1 article

Mathematical substitution cipher using linear transformations

Explore affine cipher tutorials and guides

Hill Cipher

1 article

Matrix-based polygraphic substitution cipher tutorials

Explore hill cipher tutorials and guides

Vernam Cipher

1 article

One-time pad and perfect security encryption methods

Explore vernam cipher tutorials and guides

Beaufort Cipher

1 article

Self-reciprocal variant of Vigenère cipher guides

Explore beaufort cipher tutorials and guides

Atbash Cipher

1 article

Ancient Hebrew mirror substitution cipher tutorials

Explore atbash cipher tutorials and guides

Pigpen Cipher

1 article

Geometric symbol-based substitution cipher guides

Explore pigpen cipher tutorials and guides

Polybius Cipher

1 article

Coordinate-based ancient Greek encryption methods

Explore polybius cipher tutorials and guides

Keyword Cipher

1 article

Monoalphabetic substitution cipher tutorials and cryptanalysis guides

Explore keyword cipher tutorials and guides

Calculators

26 articles

Date calculators, math tools, and utility guides for everyday calculations

Explore calculators tutorials and guides

Converters

15 articles

Number system converters, encoding tools, and unit conversion guides

Explore converters tutorials and guides

Baconian Cipher

1 article

Francis Bacon's binary steganographic cipher tutorials and guides

Explore baconian cipher tutorials and guides

Porta Cipher

1 article

Della Porta's 13-table reciprocal polyalphabetic cipher guides

Explore porta cipher tutorials and guides

Gronsfeld Cipher

1 article

Numeric-key Vigenère variant cipher tutorials and analysis

Explore gronsfeld cipher tutorials and guides

Trithemius Cipher

1 article

Tabula recta and progressive-key cipher guides

Explore trithemius cipher tutorials and guides

Alberti Cipher

1 article

The first polyalphabetic cipher disk system tutorials

Explore alberti cipher tutorials and guides

Homophonic Cipher

1 article

Homophonic substitution cipher tutorials and Zodiac Killer analysis

Explore homophonic cipher tutorials and guides

Four-Square Cipher

1 article

Delastelle's digraph encryption system tutorials and guides

Explore four-square cipher tutorials and guides

Autokey Cipher

1 article

Self-keying Vigenère variant cipher tutorials and cryptanalysis

Explore autokey cipher tutorials and guides

Quagmire Cipher

1 article

ACA's advanced polyalphabetic substitution cipher with four variants

Explore quagmire cipher tutorials and guides

Morse Code

1 article

Morse code encoding, translation, history, and learning guides

Explore morse code tutorials and guides

Frequency Analysis

1 article

Letter frequency analysis, cryptanalysis techniques, and cipher breaking guides

Explore frequency analysis tutorials and guides

Running Key Cipher

1 article

Running key cipher tutorials using book passages as encryption keys

Explore running key cipher tutorials and guides

Straddling Checkerboard

1 article

Straddling checkerboard cipher and VIC cipher Cold War espionage guides

Explore straddling checkerboard tutorials and guides

Recent Articles

Converters
March 25, 2026
16 min read

How Cryptographic Hash Functions Work — MD5 vs SHA-256 vs SHA-512 Explained

Complete guide to cryptographic hash functions covering MD5 vs SHA-256 vs SHA-512 comparison, how hashing works internally, collision attacks, password hashing best practices with bcrypt and Argon2, HMAC authentication, and applications in blockchain, TLS, and Git.

Calculators
March 20, 2026
18 min read

Subnetting Tutorial: CIDR Notation, Subnet Masks & IP Addressing Explained

Complete subnetting tutorial covering CIDR notation, subnet masks, wildcard masks, IP address classes, private IP ranges, VLSM, cloud networking, and three worked examples with a subnet cheat sheet.

Calculators
March 20, 2026
18 min read

Sales Tax by State 2026: Complete Guide to US Sales Tax Rates & Rules

Complete 2026 guide to US sales tax covering all 50 state rates, five no-tax states, calculation formulas with worked examples, reverse tax calculation, tax-exempt items, vehicle sales tax, Sales Tax vs VAT, IRS SALT deduction, and the Wayfair online sales tax decision.

Calculators
March 20, 2026
16 min read

Running Pace Chart: 5K, 10K, Half Marathon & Marathon Finish Times

Comprehensive running pace chart covering finish times for every major race distance, pace-to-speed conversion, treadmill speed tables, training pace zones, average pace by age and gender, and race day pacing strategies.

Converters
March 20, 2026
14 min read

How to Read Binary Code: Complete Guide to Binary Translation

Complete guide to reading binary code covering bits, bytes, positional notation, step-by-step decoding, ASCII and Unicode encoding, common words in binary, programming examples in Python and JavaScript, and comparison with other number systems.

Converters
March 20, 2026
16 min read

Unix Timestamp Explained: What Is Epoch Time and How Developers Use It

Complete guide to Unix timestamps and epoch time covering why developers use them, seconds vs milliseconds, programming examples in seven languages, Excel formulas, notable timestamps, the Year 2038 problem, and leap second handling.