Cryptography: The Science of Making and Breaking Codes

There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it's tough to make a code truly unbreakable.

Top 10 Uncracked Codes and Ciphers

Not even the greatest minds of the world could decipher these codes. Join as we count down our picks for the Top 10 Uncracked ...

10 Codes and Ciphers

10 Codes and Ciphers ----------------------------------------------- Subscribe to study the hidden secrets of the strange, unexplained and the macabre. Discover ...

Famous UNCRACKED Codes That STILL Exist!

Check out these famous uncracked codes that still exist! From secret riddles to unsolved mysteries, this top 10 list contains cryptography that's still unexplained ...

Transposition Ciphers - Encryption/Decryption

A beginner's guide to Transposition Ciphers (Encryption/Decryption).

How To Write in Pigpen Cipher [2 MINUTE TUTORIAL]

Pigpen cipher - also known as masonic cipher, Freemason's cipher, Napoleon cipher, and tic-tac-toe cipher - is a geometric substitution cipher based off of 4 ...

Kevin MacLeod ~ Cipher

Music by Kevin MacLeod. Available under the Creative Commons Attribution 3.0 Unported license. Download link: ...

Cryptography Lesson #1 - Block Ciphers

This tutorial video will help provide an understanding of what block ciphers are, and how they are used in the field of cryptography.

Inq's Cipher Wheel

Get your own Inq's Cipher Wheel and everything else in Box VIII: Twitter: Instagram: ...

How To Write In Templar Cipher

In this cipher tutorial, I teach you guys how to write in Templar Cipher. This cipher is formed using a variant of the Maltese Cross, and is rumored to have been ...

The Caesar cipher | Journey into cryptography | Computer Science | Khan Academy

Brit explains the Caesar cipher, the first popular substitution cipher, and shows how it was broken with "frequency analysis" Watch the next lesson: ...

The Beale Ciphers

Thomas Jefferson Beale's treasure: a hoax? An episode from the National Geophic Channel series "The Codebreakers"

How To Write in Atbash Cipher

In this tutorial, I teach you how to write in atbash cipher code. If you guys enjoyed this atbash cipher tutorial, please do remember to subscribe :) Support the ...

Vigenere Cipher 1

Encrypt the message MAKE IT HAPPEN using the Vigenėre cipher and key word MATH.

Playfair Cipher

An explanation with examples of how to encode and decode messages with the Playfair Cipher.

What is a TLS Cipher Suite?

When a web client (Internet browser) connects to a secure website, the data is encrypted. But, how does all that happen? And, what type of encryption is used?


Vigenere CIpher

This video is part of the Udacity course "Intro to Information Security". Watch the full course at

Whiteboard Wednesday: SSL Ciphers

John Wagnon discusses the SSL cipher suites available on the F5 BIG-IP. Ciphers by version of F5 BIG-IP: ...

Stream Ciphers - Encryption/Decryption

A beginner's guide to Stream Ciphers (Encryption/Decryption).

Cryptography 101 - Substitution Ciphers

In this video we look at substitution ciphers: how they are made and how to break them.

Creating An Unbreakable Cipher (nearly)

Creating Ciphers can be fun, but understanding how they work by using a simple example of developing a cipher is a great way to understand them. This video ...

Playfair Cipher Explained

An animated attempt of explaining the Playfair cipher. This tutorial includes rules of the cipher followed by an example to clear things up. This was a part of my ...

What is Zodiac's 340-Character Cipher? 2018 ACA Presentation

This is my talk given on September 8, 2018 at the annual convention of the American Cryptogram Association in Hendersonville, NC. In it I try to talk about all the ...

Cryptography and Network Security - Block ciphers - Modes of Operation(Part 1) - GATE CSE

The complete YouTube playlist can be viewed here: This lesson explains Block ciphers - Modes of Operation, under the course, ...

Polygraphic Part 2 - Hill Ciphers Examples/Encryption/Decryption

A beginner's guide to Polygraphic Ciphers, Part 2. (Hill Ciphers Examples/Encryption/Decryption)