Cipher disk
From Wikipedia, the free encyclopedia
A cipher disk is an enciphering and deciphering tool developed in the 15th century by Leon Battista Alberti. Rather than constructing a table with the regular and cipher alphabets on it, he created two circular scales, one smaller and on a disk that he mounted concentric to the larger circle. This enabled him to move the two alphabet scales relative to each other.
The cipher disk provided an easy way to change ciphers: merely moving the scales provided 26 ways to represent a letter, depending entirely on the position of the inner disk. The sender and the person receiving the messages would agree on a cipher key setting (e.g., the "G" in the regular alphabet would be positioned next to the "Q" in the cipher alphabet).
In addition to simple substitution ciphers, the cipher disk opened the way for easy polyalphabetic ciphers. An easy way to do this is for the sender and the recipient to agree that a certain number of characters into the message, the scales would be shifted one character to the right, repeating the procedure every tenth letter. This would make it more difficult to crack, using statistical methods.
The cipher disk and its variants have been used since that time. Recently, they have been labeled "decoders" and have been used for novelties. Many of the cipher disks that were radio premiums were called "secret decoder rings."
Cipher machines
|
---|
Rotor machines: CCM | Enigma | Fialka | Hebern | HX-63 | KL-7 | Lacida | M-325 | Mercury | NEMA | OMI | Portex | SIGABA | SIGCUM | Singlet | Typex |
Mechanical: Bazeries cylinder | C-36 | C-52 | CD-57 | Cipher disk | HC-9 | Kryha | Jefferson disk | M-94 | M-209 | Reihenschieber | Scytale |
Teleprinter: 5-UCO | BID 770 | KW-26 | KW-37 | Lorenz SZ 40/42 | Siemens and Halske T52 |
Secure voice: KY-3 | KY-57 | KY-58 | KY-68 | OMNI | SIGSALY | STE | STU-II | STU-III | VINSON | SCIP | Sectéra Secure Module |
Miscellaneous: Cryptex | JADE | KG-84 | KL-43 | Noreen | PURPLE | Pinwheel | Rockex |
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography |
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers |