Welcome to the Cryptography Visualization Tool! This interactive platform helps you understand various encryption and decryption techniques through step-by-step visualizations. Select a cryptographic method below to get started.
A simple substitution cipher where each letter is shifted by a fixed number of positions.
Uses a keyword to determine different Caesar shifts for each letter position.
Uses matrix multiplication for encryption and decryption of letter pairs or triplets.
Writes text in a zigzag pattern across multiple "rails" and reads off by rows.
A symmetric-key block cipher that uses a 56-bit key for encryption.
A public-key cryptosystem widely used for secure data transmission.
A method for securely exchanging cryptographic keys over a public channel.
A cryptographic hash function that produces a 160-bit hash value.