The Cipher
Museum
Interactive History of Encryption
From Polybius's torch signals to Hitler's Enigma machine to Cold War spy tradecraft — explore how humanity kept secrets, how those secrets were broken, and what every failure taught the future.
Choose Your Path Through History
Each hall tells a chapter of cryptography's story — from ancient Greece to the Cold War.
Birth of Cryptography
Ancient World · 150 BC – 100 ADCaesar's alphabet shift and Polybius's coordinate grid — the two foundational ideas that seeded 2,500 years of cryptographic history.
Classical Substitution
Medieval — Victorian · 800 – 1929Al-Kindi's frequency analysis shattered monoalphabetic ciphers in 850 AD. Renaissance cryptographers fought back with homophonic systems. Wheatstone invented digraph encryption. Hill applied matrix algebra.
The Polyalphabetic Revolution
Renaissance — 19th Century · 1553 – 1880"Le chiffre indéchiffrable" — the unbreakable cipher. Vigenère's repeating key defeated frequency analysis for 300 years, until Babbage found the fatal pattern.
Transposition & Fractionation
19th – Early 20th CenturyRearranging letters instead of replacing them. Bifid, Rail Fence, and Double Transposition show how position scrambling creates the diffusion that AES uses today.
Military & Spy Ciphers
WWI — Cold War · 1880 – 1970ADFGVX broken in 48 hours by one exhausted Frenchman. The VIC cipher — never broken by cryptanalysis, exposed only by a defector. The peak of hand-cipher design.
The Civil War Gallery
1861 – 1865The telegraph transformed warfare. Lincoln's Stager cipher secured the Union's communications. The Confederate Vigenère — already publicly broken before the war — fell to Union codebreakers routinely.
Mechanical Cipher Machines
1467 – 1945From Alberti's bronze disk to Hitler's Enigma — 500 years of mechanical cryptography. Breaking the Lorenz cipher built the world's first computer. One machine changed the course of WWII.
Puzzle & Novelty Ciphers
1605 – PresentFreemason symbols. Bacon's binary encoding from 1605. POWs tapping through prison walls. Cryptographically weak but historically fascinating — and Bacon's cipher predicted binary computing by 300 years.
The Unbreakable & the Modern
1882 — PresentOne cipher is mathematically proved unbreakable. The VENONA project showed what happens when you break the rules. And from the wreckage of classical cryptography, AES and RSA were born.
Hall of Codebreakers
850 AD — 2020The people who broke the "unbreakable." From Al-Kindi's frequency analysis to Turing's Bombe to the amateur team that cracked the Zodiac Z-340 — ten stories of codebreaking brilliance.
Six Landmark Ciphers
The exhibits every visitor should see — from the simplest shift cipher to the machine that changed history.
Caesar Cipher
The simplest substitution cipher — Julius Caesar shifted each letter by three to encode military dispatches in 58 BC.
Vigenère Cipher
The "indecipherable cipher" that resisted cryptanalysis for 300 years using a repeating polyalphabetic key.
Playfair Cipher
The first practical digraph cipher — used in the Boer War who encrypted letter pairs through a 5×5 key square.
Enigma Machine
The electromechanical rotor machine that secured Nazi communications — and whose breaking shortened WWII by years.
Lorenz Cipher
Hitler's teleprinter cipher — breaking it required Colossus, the world's first programmable electronic computer.
One-Time Pad
The only cipher mathematically proved unbreakable — Shannon's 1949 proof of perfect secrecy remains ironclad.
Find Your Exhibit
Six halls spanning 2,500 years of cryptographic history.
Scytale · Caesar · Polybius
Monoalphabetic · Homophonic · Playfair · Hill
Vigenère · Beaufort · Porta · Running Key
Rail Fence · Columnar · Bifid · Trifid
ADFGVX · Nihilist · VIC · Bazeries
Enigma · Lorenz · Jefferson Disk
Every Classical Cipher Teaches Modern Cryptography
Caesar and monoalphabetic ciphers evolved into AES S-boxes — non-linear substitution tables designed specifically to defeat frequency analysis.
Vigenère's repeating keyword became ChaCha20's continuous random keystream — the same XOR operation, with a key that never repeats.
Rail Fence and columnar transposition became AES ShiftRows — ensuring every output bit depends on every input bit.
Enigma's rotating alphabets became AES rounds — multiple iterations of substitution and permutation to achieve confusion and diffusion.
Breaking the Lorenz cipher required Colossus — the world's first programmable electronic computer. Cryptanalysis built computing.
Shannon proved the OTP is information-theoretically secure. Every modern cipher aims for computational security — as close to perfect as practical key management allows.
The Cryptanalysis Lab
Seven techniques. Twelve famous codebreaks. Interactive frequency analysis, Kasiski examination, and index of coincidence tools.
Caesar cipher · Shift unknown · Difficulty: Trivial
Hint: E is the most common letter in English. What's the most common letter here?