I am start to learn the cryptography, so I will note the Cryptography journey in my blog

Online resources

Some Cryptography online courses

Online hack platform

China Cryptography Cipher

SM4, one China Block Cipher

ShāngMì 4 (SM4, 商密4) (formerly SMS4)[2] is a block cipher used in the Chinese National Standard for Wireless LAN WAPI (WLAN Authentication and Privacy Infrastructure) and also used with Transport Layer Security.[3]

CIA of Triad of InfoSec

  • Confidentiality
  • Integrity
  • Availability


  1. Cryptography
  2. Cryptanalysis
  3. Cryptology = Cryptography + Cryptanalysis
  4. Steganography:Writing messages,such that no one else notices that they have been written.

Not Crypto

  • Encoding, e.g. md5, Base64, Base32, UTF-8

Hierarchy of Cryptology

Cryptology = Cyptography + Cryptanalysis
Cryptography = Cyptographic Hash Algorithms + Symmetric Key Algorithms + Asymmetric Key Algorithms + Protocols


Lots of useful tools



E.g. Hello, so split it as 6 bit as one group, and mapping to the Base64 table, the last 00 is padding

01001000 01100101 01101100 01101100 01101111
010010 000110 010101 101100 011011 000110 1111(00) (=) 
S      G      V      s      b      G      8

Caesar Cipher

  • https://en.wikipedia.org/wiki/Caesar_cipher

In general it shift right the number of the Character

Math behind, e.g. shift 3.



Use the online tool to encypt the message with Caesar Cipher

E.g. PlainText, shift = 2

Star Wars is an American epic space opera[1] media franchise created by George Lucas, which began with the eponymous 1977 film[a] and quickly became a worldwide pop culture phenomenon. The franchise has been expanded into various films and other media, including television series, video games, novels, comic books, theme park attractions, and themed areas, comprising an all-encompassing fictional universe.[b] Star Wars is one of the highest-grossing media franchises of all time.
Uvct Yctu ku cp Cogtkecp grke urceg qrgtc[1] ogfkc htcpejkug etgcvgf da Igqtig Nwecu, yjkej dgicp ykvj vjg grqpaoqwu 1977 hkno[c] cpf swkemna dgecog c yqtnfykfg rqr ewnvwtg rjgpqogpqp. Vjg htcpejkug jcu dggp gzrcpfgf kpvq xctkqwu hknou cpf qvjgt ogfkc, kpenwfkpi vgngxkukqp ugtkgu, xkfgq icogu, pqxgnu, eqoke dqqmu, vjgog rctm cvvtcevkqpu, cpf vjgogf ctgcu, eqortkukpi cp cnn-gpeqorcuukpi hkevkqpcn wpkxgtug.[d] Uvct Yctu ku qpg qh vjg jkijguv-itquukpi ogfkc htcpejkugu qh cnn vkog.

You can try to decode it with the online tool

  • https://www.dcode.fr/caesar-cipher

Letter frequency

  1. E: 12.7%
  2. T: 9.1%
  3. A: 8.2%

We can using the tool

In the movie, it’s using the frequency analyse

Substitution Cipher

Pigpen Cipher


Kerckhoff’s Principle

Kerckhoffs’ Principle states that the security of a cryptosystem must lie in the choice of its keys only; everything else (including the algorithm itself) should be considered public knowledge.

Enigma Machine

Railfence cipher

You can play on the CyberChef

And decode

Playfair Cipher

Shannon’s Principle for Secure Ciphers


Each bit of the ciphertext should depend on several parts of the secret key.


Changing only one bit of the plaintext should change (approximately)half the bits of the corresponding ciphertext.

We can use the CyberChef to testing, if key changed or plain text changed

Cryptography 1

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.