Classical Cryptography Simulator

Module 3: Asymmetric Key Cryptography

Explore the mathematical foundations of public key cryptography. Learn about primes, factorization, modular arithmetic, and fundamental theorems that secure modern encryption.

Module 4: Authentication & Message Integrity

Explore authentication mechanisms, security requirements, and message authentication codes. Learn how to verify identity and ensure message integrity in cryptographic systems.

Classical Cryptography Simulator

Select a cipher to start the simulation

Substitution
Caesar Cipher
Shift-based substitution cipher. Each letter is replaced by a letter a fixed number of positions down the alphabet.
Start Simulation
Substitution
Monoalphabetic Cipher
Each letter maps to a unique substitute letter using a randomized alphabet mapping.
Start Simulation
Substitution
Playfair Cipher
Digraph substitution cipher using a 5×5 key matrix. Encrypts pairs of letters.
Start Simulation
Substitution
Hill Cipher
Polygraphic substitution cipher using matrix multiplication. Encrypts character pairs using 2×2 key matrix.
Start Simulation
Substitution
Polyalphabetic Cipher
Vigenère cipher using a repeating keyword to create multiple shift values. More secure than Caesar cipher.
Start Simulation
Transposition
Rail Fence Cipher
Transposition cipher that writes plaintext in a zigzag pattern across multiple rails.
Start Simulation
Transposition
Columnar Transposition
Rearranges plaintext by writing it in rows and reading columns in a key-specified order.
Start Simulation
Concealment
Steganography
Conceptual demonstration of hiding secret messages within cover data.
Start Simulation
Modern
Block Cipher
Demonstrates block cipher encryption using substitution and permutation operations on fixed-size blocks.
Start Simulation
Concepts
Confusion & Diffusion
Fundamental cryptographic principles: confusion obscures plaintext relationships, diffusion spreads statistics across ciphertext.
Start Simulation
Modern
RC4 Stream Cipher
Pseudorandom number generator based stream cipher. Uses Key Scheduling Algorithm (KSA) and Pseudorandom Generation Algorithm (PRGA).
Start Simulation
Modern
DES (Data Encryption Standard)
Symmetric-key block cipher with 16 Feistel rounds. Demonstrates permutation, substitution, key scheduling, and S-box transformations.
Start Simulation
Modern
AES (Advanced Encryption Standard)
Modern symmetric encryption standard. Supports 128, 192, and 256-bit keys with SubBytes, ShiftRows, MixColumns, and AddRoundKey transformations.
Start Simulation
Security Concepts
Network Security Model
Understanding the network security model with sender, recipient, trusted third party, and opponent roles in secure communication.
Start Simulation
Mathematical Tools
GCD Calculator
Calculate Greatest Common Divisor using the Euclidean algorithm with step-by-step visualization. Essential for understanding number theory in cryptography.
Start Simulation