# Findings:

- cipher
- Soviet Espionage Cipher
- Block cipher
- symmetric cipher
- ADFGVX cipher
- Playfair Cipher
- homophonic substitution cipher
- null cipher
- bifid cipher
- M209 Cipher Machine
- block cipher cryptanalysis
- mechanical cipher system
- VIC cipher
- cipher text
- Simon Singh's Code Book Cipher Challenge Cracked
- polyalphabetic substitution cipher
- Bacon Cipher
- rail fence cipher
- substitution cipher
- Stream Cipher
- Keyword substitution cipher
- hybrid cryptosystem
- synchronous stream cipher
- transposition cipher
- Ideal cipher model
- Pigpen Cipher
- monoalphabetic substitution cipher
- Additive Stream Ciphers
- running key cipher
- Hash Cipher
- self-synchronizing stream cipher
- cipher alphabet
- Hill cipher
- The Beale ciphers
- Caesar shift cipher
- Turning grill transposition cipher
- Permutation cipher
- Caesar's Cipher
- ERIKO-CHAN cipher
- asymmetric cipher
- random key substitution cipher
- atbash cipher
- simple substitution cipher
- cipher (user)
- Nihilist cipher

If you Log in you could create a "ciphered" node. If you don't already have an account, you can register here.