Est. 150 BC — Present Day

The Cipher
Museum

Interactive History of Encryption

From Polybius's torch signals to Hitler's Enigma machine to Cold War spy tradecraft — explore how humanity kept secrets, how those secrets were broken, and what every failure taught the future.

37Historic Ciphers
10Exhibit Halls
2,500+Years of History
1Unbreakable Cipher
Enter the Museum → Begin the Tour → View Museum Map
Ten Exhibit Halls

Choose Your Path Through History

Each hall tells a chapter of cryptography's story — from ancient Greece to the Cold War.

Hall I

Birth of Cryptography

Ancient World · 150 BC – 100 AD

Caesar's alphabet shift and Polybius's coordinate grid — the two foundational ideas that seeded 2,500 years of cryptographic history.

Caesar CipherPolybius Square
Enter Hall I →
Hall II

Classical Substitution

Medieval — Victorian · 800 – 1929

Al-Kindi's frequency analysis shattered monoalphabetic ciphers in 850 AD. Renaissance cryptographers fought back with homophonic systems. Wheatstone invented digraph encryption. Hill applied matrix algebra.

MonoalphabeticHomophonicPlayfairHill Cipher
Enter Hall II →
Hall III

The Polyalphabetic Revolution

Renaissance — 19th Century · 1553 – 1880

"Le chiffre indéchiffrable" — the unbreakable cipher. Vigenère's repeating key defeated frequency analysis for 300 years, until Babbage found the fatal pattern.

VigenèreBeaufortPortaRunning Key
Enter Hall III →
Hall IV

Transposition & Fractionation

19th – Early 20th Century

Rearranging letters instead of replacing them. Bifid, Rail Fence, and Double Transposition show how position scrambling creates the diffusion that AES uses today.

Rail FenceDouble TranspositionBifidTrifid
Enter Hall IV →
Hall V

Military & Spy Ciphers

WWI — Cold War · 1880 – 1970

ADFGVX broken in 48 hours by one exhausted Frenchman. The VIC cipher — never broken by cryptanalysis, exposed only by a defector. The peak of hand-cipher design.

ADFGVXNihilistBazeriesVIC Cipher
Enter Hall V →
Special Exhibition

The Civil War Gallery

1861 – 1865

The telegraph transformed warfare. Lincoln's Stager cipher secured the Union's communications. The Confederate Vigenère — already publicly broken before the war — fell to Union codebreakers routinely.

Stager CipherConfederate VigenèreDictionary Code
Enter Gallery →
Hall VI

Mechanical Cipher Machines

1467 – 1945

From Alberti's bronze disk to Hitler's Enigma — 500 years of mechanical cryptography. Breaking the Lorenz cipher built the world's first computer. One machine changed the course of WWII.

Alberti DiskJefferson DiskEnigmaLorenz
Enter Hall VI →
Hall VII

Puzzle & Novelty Ciphers

1605 – Present

Freemason symbols. Bacon's binary encoding from 1605. POWs tapping through prison walls. Cryptographically weak but historically fascinating — and Bacon's cipher predicted binary computing by 300 years.

PigpenBacon's CipherTap Code
Enter Hall VII →
Final Hall

The Unbreakable & the Modern

1882 — Present

One cipher is mathematically proved unbreakable. The VENONA project showed what happens when you break the rules. And from the wreckage of classical cryptography, AES and RSA were born.

One-Time PadModern Crypto
Enter Final Hall →
Special Exhibition

Hall of Codebreakers

850 AD — 2020

The people who broke the "unbreakable." From Al-Kindi's frequency analysis to Turing's Bombe to the amateur team that cracked the Zodiac Z-340 — ten stories of codebreaking brilliance.

Al-KindiTuringFriedmanNavajo
Enter Exhibition →
Featured Exhibits

Six Landmark Ciphers

The exhibits every visitor should see — from the simplest shift cipher to the machine that changed history.

Museum Directory

Find Your Exhibit

Six halls spanning 2,500 years of cryptographic history.

🏛️Hall I · Ancient

Scytale · Caesar · Polybius

🔤Hall II · Classical

Monoalphabetic · Homophonic · Playfair · Hill

🔑Hall III · Polyalphabetic

Vigenère · Beaufort · Porta · Running Key

🔀Hall IV · Transposition

Rail Fence · Columnar · Bifid · Trifid

⚔️Hall V · Military

ADFGVX · Nihilist · VIC · Bazeries

⚙️Hall VI · Machines

Enigma · Lorenz · Jefferson Disk

View Full Map →
Why History Matters

Every Classical Cipher Teaches Modern Cryptography

🔄Substitution → S-Boxes

Caesar and monoalphabetic ciphers evolved into AES S-boxes — non-linear substitution tables designed specifically to defeat frequency analysis.

🌊Polyalphabetic → Stream Ciphers

Vigenère's repeating keyword became ChaCha20's continuous random keystream — the same XOR operation, with a key that never repeats.

🔀Transposition → Permutation

Rail Fence and columnar transposition became AES ShiftRows — ensuring every output bit depends on every input bit.

⚙️Rotor Machines → Block Ciphers

Enigma's rotating alphabets became AES rounds — multiple iterations of substitution and permutation to achieve confusion and diffusion.

💻Lorenz → Computing

Breaking the Lorenz cipher required Colossus — the world's first programmable electronic computer. Cryptanalysis built computing.

🎲One-Time Pad → Perfect Secrecy

Shannon proved the OTP is information-theoretically secure. Every modern cipher aims for computational security — as close to perfect as practical key management allows.

Interactive Challenge

The Cryptanalysis Lab

Seven techniques. Twelve famous codebreaks. Interactive frequency analysis, Kasiski examination, and index of coincidence tools.

⚔ Break This Cipher

Caesar cipher · Shift unknown · Difficulty: Trivial

XLI UYMGO FVSAR JSB NYQTW SZIV XLI PEWC HSK

Hint: E is the most common letter in English. What's the most common letter here?

Enter the Cryptanalysis Lab →