1. Caesar cipher: This is a simple substitution cipher that replaces each letter in the original message with a letter a fixed number of positions down the alphabet.
  2. Atbash cipher: This is a substitution cipher that replaces each letter in the original message with its opposite letter in the alphabet (e.g., A is replaced with Z, B is replaced with Y, etc.).
  3. Rail fence cipher: This is a transposition cipher that involves writing the message out in rows and then reading the message off by columns.
  4. Columnar transposition cipher: This is a transposition cipher that involves writing the message out in columns and then reading the message off by rows.
  5. Vigenère cipher: This is a polyalphabetic cipher that uses multiple substitution alphabets to encode the message.
  6. Enigma machine: This is a polyalphabetic cipher that was used by the Germans during World War II. It used a complex system of rotors and reflectors to encode the message.
  7. One-time pad: This is a cipher that uses a truly random key that is at least as long as the message being encrypted. One-time pads are considered to be completely unbreakable, as long as the key is kept secret.
  8. Affine cipher: This is a substitution cipher that uses a linear function to encrypt the message.
  9. Playfair cipher: This is a substitution cipher that uses a 5x5 grid to encode the message.
  10. Beaufort cipher: This is a variant of the Vigenère cipher that uses a different encryption and decryption method.
  11. Bifid cipher: This is a combination of a substitution cipher and a transposition cipher. It involves dividing the message into groups of letters, encrypting each group using a substitution cipher, and then rearranging the groups according to a fixed rule.
  12. Hill cipher: This is a substitution cipher that uses matrix operations to encrypt and decrypt the message.
  13. ADFGVX cipher: This is a substitution cipher that was used by the Germans during World War I. It uses a 6x6 grid to encode the message.
  14. Grille cipher: This is a transposition cipher that involves using a grid to encode the message. The sender and recipient both have copies of the grid, and the message is written in the grid according to a predetermined pattern.
  15. book cipher: This is a cipher that uses a book or other written material as the key. The key consists of page numbers, line numbers, and word numbers, and the message is encoded by substituting the corresponding words from the key for the words in the original message.
  16. Morse code: This is a cipher that uses a series of dots and dashes to represent letters and numbers. It was originally developed for use in telegraphy, but is still in use today as a way of communicating messages using flashing lights or tones.
  17. Baconian cipher: This is a substitution cipher that uses a series of 5-letter groups to represent the letters of the alphabet. Each letter is represented by a unique combination of A's and B's.
  18. Wheatstone-Playfair cipher: This is a substitution cipher that was invented by Sir Charles Wheatstone and used a 5x5 grid to encode the message.
  19. Four-square cipher: This is a substitution cipher that uses four 5x5 grids to encode the message.
  20. Five-square cipher: This is a substitution cipher that uses five 5x5 grids to encode the message.
  21. Six-square cipher: This is a substitution cipher that uses six 5x5 grids to encode the message.
  22. Double Playfair cipher: This is a variant of the Playfair cipher that uses two different 5x5 grids to encode the message.
  23. Alberti cipher disk: This is a substitution cipher that was invented by Leon Battista Alberti in the 15th century. It uses a set of rotating disks with the alphabet written on them to encode the message.
  24. Jefferson disk: This is a variant of the Alberti cipher disk that was used by Thomas Jefferson.
  25. Buchstabensalat: This is a cipher that was used by the Germans during World War II. It involves rearranging the letters of the original message according to a fixed rule.
  26. Vernam cipher: This is a variant of the one-time pad cipher that was developed by Gilbert Vernam.
  27. Permutation cipher: This is a cipher that involves rearranging the positions of the letters in the original message according to a fixed rule.
  28. Running key cipher: This is a variant of the Vigenère cipher that uses a long piece of text, such as a book, as the key.
  29. Autokey cipher: This is a variant of the Vigenère cipher that uses a portion of the original message as the key.
  30. Shift cipher: This is a simple substitution cipher that shifts the letters of the alphabet by a fixed number of positions.
  31. Reverse cipher: This is a simple substitution cipher that reverses the order of the letters in the original message.
  32. ROT13 cipher: This is a simple substitution cipher that shifts the letters of the alphabet by 13 positions.
  33. A1Z26 cipher: This is a simple substitution cipher that assigns each letter of the alphabet a number from 1 to 26.
  34. Caesar box: This is a variant of the Caesar cipher that involves dividing the message into a grid and shifting the rows and columns according to a fixed rule.
  35. Keyed Caesar cipher: This is a variant of the Caesar cipher that uses a key to determine the number of positions to shift the letters.
  36. Affine Hill cipher: This is a variant of the Hill cipher that uses affine transformations to encrypt and decrypt the message.
  37. Hill-2 cipher: This is a variant of the Hill cipher that uses a 2x2 matrix to encrypt and decrypt the message.
  38. Hill-3 cipher: This is a variant of the Hill cipher that uses a 3x3 matrix to encrypt and decrypt the message.
  39. Hill-4 cipher: This is a variant of the Hill cipher that uses a 4x4 matrix to encrypt and decrypt the message.
  40. Hill-5 cipher: This is a variant of the Hill cipher that uses a 5x5 matrix to encrypt and decrypt the message.
  41. Hill-6 cipher: This is a variant of the Hill cipher that uses a 6x6 matrix to encrypt and decrypt the message.
  42. Hill-7 cipher: This is a variant of the Hill cipher that uses a 7x7 matrix to encrypt and decrypt the message.
  43. Multiple alphabet cipher: This is a cipher that uses multiple substitution alphabets to encode the message.
  44. Multiple substitution cipher: This is a cipher that uses multiple substitution rules to encode the message.
  45. Multiple transposition cipher: This is a cipher that uses multiple transposition rules to rearrange the letters of the original message.
  46. Fan cipher: This is a cipher that involves dividing the message into a grid and then rearranging the rows and columns according to a fixed rule.
  47. Grille cipher with nulls: This is a variant of the grille cipher that involves using nulls, or blank spaces, in the grid to make the cipher more difficult to break.
  48. Homophonic substitution cipher: This is a cipher that replaces each letter in the original message with multiple symbols or letters, making it more difficult to break the cipher.
  49. Keyword cipher: This is a cipher that uses a keyword to determine the substitution alphabet.
  50. Multiple anagram cipher: This is a cipher that involves dividing the message into groups of letters and then rearranging the letters within each group according to a fixed rule.
  51. Null cipher: This is a cipher that involves leaving certain letters of the original message unchanged or replacing them with nulls, or blank spaces.
  52. Nihilist cipher: This is a substitution cipher that uses a keyword to determine the substitution alphabet and also includes nulls, or blank spaces, in the encoded message.
  53. Quagmire cipher: This is a cipher that involves dividing the message into a grid and then rearranging the rows and columns according to a fixed rule. It was used by the British during World War II.
  54. Quagmire II cipher: This is a variant of the Quagmire cipher that uses a different method of encoding the message.
  55. Quagmire III cipher: This is another variant of the Quagmire cipher that uses a different method of encoding the message.
  56. Quagmire IV cipher: This is yet another variant of the Quagmire cipher that uses a different method of encoding the message.
  57. Straddling checkerboard: This is a substitution cipher that uses a checkerboard to encode the message.
  58. Teleprinter cipher: This is a cipher that was used to encode messages sent over telegraph lines.
  59. Trifid cipher: This is a combination of a substitution cipher, a transposition cipher, and a polyalphabetic cipher. It was invented by Félix Delastelle.
  60. VIC cipher: This is a cipher that was used by the Soviet Union during the Cold War. It uses a combination of substitution and transposition to encode the message.
  61. Wigmore cipher: This is a cipher that was used by the British during World War II. It involves dividing the message into groups of letters and then rearranging the letters within each group according to a fixed rule.
  62. Autoclave cipher: This is a cipher that was used by the British during World War II. It involves dividing the message into groups of letters and then rearranging the letters within each group according to a fixed rule.
  63. Bifid cipher with nulls: This is a variant of the bifid cipher that includes nulls, or blank spaces, in the encoded message.
  64. Checkerboard cipher: This is a substitution cipher that uses a checkerboard to encode the message.
  65. Double transposition cipher: This is a cipher that uses two different transposition rules to rearrange the letters of the original message.
  66. Keyed Vigenère cipher: This is a variant of the Vigenère cipher that uses a key to determine the substitution alphabets.
  67. Multiple-alphabet Polybius square: This is a variant of the Polybius square cipher that uses multiple substitution alphabets.
  68. Porta cipher: This is a polyalphabetic cipher that was invented by Giovanni Battista della Porta.
  69. Redefence cipher: This is a transposition cipher that involves dividing the message into groups of letters and then rearranging the letters within each group according to a fixed rule.
  70. Reverse alphabet cipher: This is a substitution cipher that replaces each letter in the original message with the letter that is a fixed number of positions before it in the alphabet.
  71. Simple substitution cipher with nulls: This is a variant of the simple substitution cipher that includes nulls, or blank spaces, in the encoded message.
  72. Trithemius cipher: This is a polyalphabetic cipher that was invented by Johannes Trithemius.
  73. Two-square cipher: This is a substitution cipher that uses two different 5x5 grids to encode the message.
  74. Variant Beaufort cipher: This is a variant of the Beaufort cipher that uses a different method of encryption and decryption.
  75. Four-square cipher with nulls: This is a variant of the four-square cipher that includes nulls, or blank spaces, in the encoded message.
  76. Five-square cipher with nulls: This is a variant of the five-square cipher that includes nulls, or blank spaces, in the encoded message.
  77. Six-square cipher with nulls: This is a variant of the six-square cipher that includes nulls, or blank spaces, in the encoded message.
  78. Additive cipher: This is a substitution cipher that replaces each letter in the original message with the letter that is a fixed number of positions down the alphabet.
  79. Caesar cipher with nulls: This is a variant of the Caesar cipher that includes nulls, or blank spaces, in the encoded message.
  80. Double columnar transposition cipher: This is a cipher that uses two different transposition rules to rearrange the letters of the original message.
  81. Keyed Caesar cipher with nulls: This is a variant of the keyed Caesar cipher that includes nulls, or blank spaces, in the encoded message.
  82. Keyed Vigenère cipher with nulls: This is a variant of the keyed Vigenère cipher that includes nulls, or blank spaces, in the encoded message.
  83. Multiple-alphabet autokey cipher: This is a variant of the autokey cipher that uses multiple substitution alphabets.
  84. Multiple-alphabet Vigenère cipher: This is a variant of the Vigenère cipher that uses multiple substitution alphabets.
  85. Multiple-key Vigenère cipher: This is a variant of the Vigenère cipher that uses multiple keys to determine the substitution alphabets.
  86. Simple substitution cipher with mixed alphabets: This is a variant of the simple substitution cipher that uses a combination of upper and lower case letters to encode the message.
  87. Simple substitution cipher with mixed alphabets and nulls: This is a variant of the simple substitution cipher with mixed alphabets that includes nulls, or blank spaces, in the encoded message.
  88. Trifid cipher with nulls: This is a variant of the trifid cipher that includes nulls, or blank spaces, in the encoded message.
  89. Two-square cipher with nulls: This is a variant of the two-square cipher that includes nulls, or blank spaces, in the encoded message.
  90. Variant Beaufort cipher with nulls: This is a variant of the variant Beaufort cipher that includes nulls, or blank spaces, in the encoded message.
  91. Baconian cipher with mixed alphabets: This is a variant of the Baconian cipher that uses a combination of upper and lower case letters to encode the message.
  92. Caesar cipher with mixed alphabets: This is a variant of the Caesar cipher that uses a combination of upper and lower case letters to encode the message.
  93. Four-square cipher with mixed alphabets: This is a variant of the four-square cipher that uses a combination of upper and lower case letters to encode the message.
  94. Keyed Caesar cipher with mixed alphabets: This is a variant of the keyed Caesar cipher that uses a combination of upper and lower case letters to encode the message.
  95. Multiple-alphabet autokey cipher with nulls: This is a variant of the multiple-alphabet autokey cipher that includes nulls, or blank spaces, in the encoded message.
  96. Multiple-alphabet Vigenère cipher with nulls: This is a variant of the multiple-alphabet Vigenère cipher that includes nulls, or blank spaces, in the encoded message.
  97. Multiple-key Vigenère cipher with nulls: This is a variant of the multiple-key Vigenère cipher that includes nulls, or blank spaces, in the encoded message.
  98. Simple substitution cipher with mixed alphabets and digits: This is a variant of the simple substitution cipher with mixed alphabets that includes digits in the encoded message.
  99. Trifid cipher with mixed alphabets: This is a variant of the trifid cipher that uses a combination of upper and lower case letters to encode the message.
  100. Two-square cipher with mixed alphabets: This is a variant of the two-square cipher that uses a combination of upper and lower case letters to encode the message.
  101. Variant Beaufort cipher with mixed alphabets: This is a variant of the variant Beaufort cipher that uses a combination of upper and lower case letters to encode the message.
  102. Baconian cipher with mixed alphabets and digits: This is a variant of the Baconian cipher that uses a combination of upper and lower case letters and digits to encode the message.
  103. Caesar cipher with mixed alphabets and digits: This is a variant of the Caesar cipher that uses a combination of upper and lower case letters and digits to encode the message.
  104. Four-square cipher with mixed alphabets and digits: This is a variant of the four-square cipher that uses a combination of upper and lower case letters and digits to encode the message.
  105. Keyed Caesar cipher with mixed alphabets and digits: This is a variant of the keyed Caesar cipher that uses a combination of upper and lower case letters and digits to encode the message.
  106. Multiple-alphabet autokey cipher with mixed alphabets: This is a variant of the multiple-alphabet autokey cipher that uses a combination of upper and lower case letters to encode the message.
  107. Multiple-alphabet Vigenère cipher with mixed alphabets: This is a variant of the multiple-alphabet Vigenère cipher that uses a combination of upper and lower case letters to encode the message.
  108. Multiple-key Vigenère cipher with mixed alphabets: This is a variant of the multiple-key Vigenère cipher that uses a combination of upper and lower case letters to encode the message.
  109. Simple substitution cipher with mixed alphabets, digits, and special characters: This is a variant of the simple substitution cipher with mixed alphabets that includes digits and special characters in the encoded message.
  110. Trifid cipher with mixed alphabets and digits: This is a variant of the trifid cipher that uses a combination of upper and lower case letters and digits to encode the message.
  111. Variant Beaufort cipher with mixed alphabets and digits: This is a variant of the variant Beaufort cipher that uses a combination of upper and lower case letters and digits to encode the message.
  112. Baconian cipher with mixed alphabets, digits, and special characters: This is a variant of the Baconian cipher that uses a combination of upper and lower case letters, digits, and special characters to encode the message.
  113. Caesar cipher with mixed alphabets, digits, and special characters: This is a variant of the Caesar cipher that uses a combination of upper and lower case letters, digits, and special characters to encode the message.
  114. Four-square cipher with mixed alphabets, digits, and special characters: This is a variant of the four-square cipher that uses a combination of upper and lower case letters, digits, and special characters to encode the message.
  115. Keyed Caesar cipher with mixed alphabets, digits, and special characters: This is a variant of the keyed Caesar cipher that uses a combination of upper and lower case letters, digits, and special characters to encode the message.
  116. Multiple-alphabet autokey cipher with mixed alphabets and digits: This is a variant of the multiple-alphabet autokey cipher that uses a combination of upper and lower case letters and digits to encode the message.
  117. Multiple-key Vigenère cipher with mixed alphabets and digits: This is a variant of the multiple-key Vigenère cipher that uses a combination of upper and lower case letters and digits to encode the message.
  118. Simple substitution cipher with mixed alphabets, digits, special characters, and nulls: This is a variant of the simple substitution cipher with mixed alphabets that includes digits, special characters, and nulls in the encoded message.
  119. Trifid cipher with mixed alphabets, digits, and special characters: This is a variant of the trifid cipher that uses a combination of upper and lower case letters, digits, and special characters to encode the message.
  120. Two-square cipher with mixed alphabets, digits, and special characters: This is a variant of the two-square cipher that uses a combination of upper and lower case letters, digits, and special characters to encode the message.
  121. Variant Beaufort cipher with mixed alphabets, digits, and special characters: This is a variant of the variant Beaufort cipher that uses a combination of upper and lower case letters, digits, and special characters to encode the message.
  122. Caesar cipher with mixed alphabets, digits, special characters, and nulls: This is a variant of the Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, and nulls to encode the message.
  123. Four-square cipher with mixed alphabets, digits, special characters, and nulls: This is a variant of the four-square cipher that uses a combination of upper and lower case letters, digits, special characters, and nulls to encode the message.
  124. Keyed Caesar cipher with mixed alphabets, digits, special characters, and nulls: This is a variant of the keyed Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, and nulls to encode the message.
  125. Multiple-alphabet autokey cipher with mixed alphabets, digits, and special characters: This is a variant of the multiple-alphabet autokey cipher that uses a combination of upper and lower case letters, digits, and special characters to encode the message.
  126. Multiple-alphabet Vigenère cipher with mixed alphabets, digits, and special characters: This is a variant of the multiple-alphabet Vigenère cipher that uses a combination of upper and lower case letters, digits, and special characters to encode the message.
  127. Multiple-key Vigenère cipher with mixed alphabets, digits, and special characters: This is a variant of the multiple-key Vigenère cipher that uses a combination of upper and lower case letters, digits, and special characters to encode the message.
  128. Simple substitution cipher with mixed alphabets, digits, special characters, nulls, and upper/lower case variations: This is a variant of the simple substitution cipher with mixed alphabets that includes digits, special characters, nulls, and upper/lower case variations in the encoded message.
  129. Trifid cipher with mixed alphabets, digits, special characters, and nulls: This is a variant of the trifid cipher that uses a combination of upper and lower case letters, digits, special characters, and nulls to encode the message.
  130. Two-square cipher with mixed alphabets, digits, special characters, and nulls: This is a variant of the two-square cipher that uses a combination of upper and lower case letters, digits, special characters, and nulls to encode the message.
  131. Variant Beaufort cipher with mixed alphabets, digits, special characters, and nulls: This is a variant of the variant Beaufort cipher that uses a combination of upper and lower case letters, digits, special characters, and nulls to encode the message.
  132. Baconian cipher with mixed alphabets, digits, special characters, nulls, and upper/lower case variations: This is a variant of the Baconian cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, and upper/lower case variations to encode the message.
  133. Caesar cipher with mixed alphabets, digits, special characters, nulls, and upper/lower case variations: This is a variant of the Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, and upper/lower case variations to encode the message.
  134. Four-square cipher with mixed alphabets, digits, special characters, nulls, and upper/lower case variations: This is a variant of the four-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, and upper/lower case variations to encode the message.
  135. Keyed Caesar cipher with mixed alphabets, digits, special characters, nulls, and upper/lower case variations: This is a variant of the keyed Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, and upper/lower case variations to encode the message.
  136. Multiple-alphabet autokey cipher with mixed alphabets, digits, special characters, and nulls: This is a variant of the multiple-alphabet autokey cipher that uses a combination of upper and lower case letters, digits, special characters, and nulls to encode the message.
  137. Multiple-alphabet Vigenère cipher with mixed alphabets, digits, special characters, and nulls: This is a variant of the multiple-alphabet Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, and nulls to encode the message.
  138. Multiple-key Vigenère cipher with mixed alphabets, digits, special characters, and nulls: This is a variant of the multiple-key Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, and nulls to encode the message.
  139. Simple substitution cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets: This is a variant of the simple substitution cipher with mixed alphabets that includes digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets in the encoded message.
  140. Trifid cipher with mixed alphabets, digits, special characters, nulls, and upper/lower case variations: This is a variant of the trifid cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, and upper/lower case variations to encode the message.
  141. Two-square cipher with mixed alphabets, digits, special characters, nulls, and upper/lower case variations: This is a variant of the two-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, and upper/lower case variations to encode the message.
  142. Variant Beaufort cipher with mixed alphabets, digits, special characters, nulls, and upper/lower case variations: This is a variant of the variant Beaufort cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, and upper/lower case variations to encode the message.
  143. Baconian cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets: This is a variant of the Baconian cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets to encode the message.
  144. Caesar cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets: This is a variant of the Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets to encode the message.
  145. Four-square cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets: This is a variant of the four-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets to encode the message.
  146. Keyed Caesar cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets: This is a variant of the keyed Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets to encode the message.
  147. Multiple-alphabet autokey cipher with mixed alphabets, digits, special characters, nulls, and upper/lower case variations: This is a variant of the multiple-alphabet autokey cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, and upper/lower case variations to encode the message.
  148. Multiple-alphabet Vigenère cipher with mixed alphabets, digits, special characters, nulls, and upper/lower case variations: This is a variant of the multiple-alphabet Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, and upper/lower case variations to encode the message.
  149. Multiple-key Vigenère cipher with mixed alphabets, digits, special characters, nulls, and upper/lower case variations: This is a variant of the multiple-key Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, and upper/lower case variations to encode the message.
  150. Simple substitution cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition: This is a variant of the simple substitution cipher with mixed alphabets that includes digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition in the encoded message.
  151. Trifid cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets: This is a variant of the trifid cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets to encode the message.
  152. Two-square cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets: This is a variant of the two-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, and multiple substitution alphabets to encode the message.
  153. Baconian cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition: This is a variant of the Baconian cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition to encode the message.
  154. Caesar cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition: This is a variant of the Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition to encode the message.
  155. Four-square cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition: This is a variant of the four-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition to encode the message.
  156. Keyed Caesar cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition: This is a variant of the keyed Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition to encode the message.
  157. Multiple-alphabet Vigenère cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition: This is a variant of the multiple-alphabet Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition to encode the message.
  158. Multiple-key Vigenère cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition: This is a variant of the multiple-key Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition to encode the message.
  159. Simple substitution cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys: This is a variant of the simple substitution cipher with mixed alphabets that includes digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys in the encoded message.
  160. Trifid cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition: This is a variant of the trifid cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition to encode the message.
  161. Two-square cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition: This is a variant of the two-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition to encode the message.
  162. Variant Beaufort cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition: This is a variant of the variant Beaufort cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, and transposition to encode the message.
  163. Baconian cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys: This is a variant of the Baconian cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys to encode the message.
  164. Caesar cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys: This is a variant of the Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys to encode the message.
  165. Four-square cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys: This is a variant of the four-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys to encode the message.
  166. Keyed Caesar cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys: This is a variant of the keyed Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys to encode the message.
  167. Multiple-alphabet autokey cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys: This is a variant of the multiple-alphabet autokey cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys to encode the message.
  168. Multiple-alphabet Vigenère cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys: This is a variant of the multiple-alphabet Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys to encode the message.
  169. Multiple-key Vigenère cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys: This is a variant of the multiple-key Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, and encipherment with multiple keys to encode the message.
  170. Simple substitution cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption: This is a variant of the simple substitution cipher with mixed alphabets that includes digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption in the encoded message.
  171. Trifid cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption: This is a variant of the trifid cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption to encode the message.
  172. Two-square cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption: This is a variant of the two-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption to encode the message.
  173. Variant Beaufort cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption: This is a variant of the variant Beaufort cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption to encode the message.
  174. Baconian cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption: This is a variant of the Baconian cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption to encode the message.
  175. Caesar cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption: This is a variant of the Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption to encode the message.
  176. Four-square cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption: This is a variant of the four-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption to encode the message.
  177. Keyed Caesar cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption: This is a variant of the keyed Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption to encode the message.
  178. Multiple-alphabet Vigenère cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption: This is a variant of the multiple-alphabet Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption to encode the message.
  179. Multiple-key Vigenère cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption: This is a variant of the multiple-key Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, and encipherment with additional layers of encryption to encode the message.
  180. Simple substitution cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys: This is a variant of the simple substitution cipher with mixed alphabets that includes digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys in the encoded message.
  181. Trifid cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys: This is a variant of the trifid cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys to encode the message.
  182. Two-square cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys: This is a variant of the two-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys to encode the message.
  183. Variant Beaufort cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys: This is a variant of the variant Beaufort cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys to encode the message.
  184. Baconian cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys: This is a variant of the Baconian cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys to encode the message.
  185. Caesar cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys: This is a variant of the Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys to encode the message.
  186. Four-square cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys: This is a variant of the four-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys to encode the message.
  187. Keyed Caesar cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys: This is a variant of the keyed Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys to encode the message.
  188. Multiple-alphabet autokey cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys: This is a variant of the multiple-alphabet autokey cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys to encode the message.
  189. Multiple-alphabet Vigenère cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys: This is a variant of the multiple-alphabet Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, and encipherment with a combination of symmetric and asymmetric keys to encode the message.
  190. Simple substitution cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys: This is a variant of the simple substitution cipher with mixed alphabets that includes digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys in the encoded message.
  191. Trifid cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys: This is a variant of the trifid cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys to encode the message.
  192. Variant Beaufort cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys: This is a variant of the variant Beaufort cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys to encode the message.
  193. Baconian cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys: This is a variant of the Baconian cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys to encode the message.
  194. Caesar cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys: This is a variant of the Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys to encode the message.
  195. Four-square cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys: This is a variant of the four-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys to encode the message.
  196. Keyed Caesar cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys: This is a variant of the keyed Caesar cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys to encode the message.
  197. Multiple-alphabet Vigenère cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys: This is a variant of the multiple-alphabet Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys to encode the message.
  198. Multiple-key Vigenère cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys: This is a variant of the multiple-key Vigenère cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys to encode the message.
  199. Two-square cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys: This is a variant of the two-square cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys to encode the message.
  200. Multiple-alphabet autokey cipher with mixed alphabets, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys: This is a variant of the multiple-alphabet autokey cipher that uses a combination of upper and lower case letters, digits, special characters, nulls, upper/lower case variations, multiple substitution alphabets, transposition, encipherment with multiple keys, encipherment with additional layers of encryption, encipherment with a combination of symmetric and asymmetric keys, and encipherment with additional layers of encryption using a combination of symmetric and asymmetric keys to encode the message.