Cryptography Visualization Tool

Welcome to the Cryptography Visualization Tool! This interactive platform helps you understand various encryption and decryption techniques through step-by-step visualizations. Select a cryptographic method below to get started.

Substitution Ciphers

Caesar Cipher

A simple substitution cipher where each letter is shifted by a fixed number of positions.

Vigenère Cipher

Uses a keyword to determine different Caesar shifts for each letter position.

Hill Cipher

Uses matrix multiplication for encryption and decryption of letter pairs or triplets.

Transposition Ciphers

Rail Fence Cipher

Writes text in a zigzag pattern across multiple "rails" and reads off by rows.

Modern Algorithms

DES (Data Encryption Standard)

A symmetric-key block cipher that uses a 56-bit key for encryption.

RSA Algorithm

A public-key cryptosystem widely used for secure data transmission.

Diffie-Hellman Key Exchange

A method for securely exchanging cryptographic keys over a public channel.

SHA-1 (Secure Hash Algorithm)

A cryptographic hash function that produces a 160-bit hash value.