Best Cipher Tools Available Now

Home > Blogs > Security > Best Cipher Tools Available Now

Best Cipher Tools Available Now

Like This Blog 0 Steve Fullmer
Added by November 27, 2017

Have you read or watched The Imitation Game? Do you have a desire to explore the world of the code breaker?

In a former element of my career path I had the fortune to work with some of the best security officers and cryptographers in the banking industry, and potentially across the IT industry. Once a dragoman (decoder), always a dragoman?

We provide a small overview of cryptography in our CompTIA Security+ certification course, though barely enough to cover the multiple variants for concealing or obscuring information. We present steganography, simple rotation and substitution ciphers, symmetric and asymmetric encryption, and a small range of data security techniques. The science is far broader. The goal is obfuscation – hiding valued content in plain sight so that only the informed might find or retrieve it.

As an avid geocacher, I have been hiding and seeking hidden treasure with my family for many years. It is always fun to discover the treasures that everyone else bypasses.

A few years ago, I discovered Ancient Societies , an online blog site preparing participants for the interactive, online multi-player game based on the book EndGame. Stella Vyctory, the site’s founder and hostess, provides sophisticated puzzles and challenges near daily for site followers (her ‘students’). Attempting to be amongst the first to solve the challenges, or perhaps even the hundredth to discover the meaning, can become addicting. A short review of top participants identifies some of the most talented cryptographers, linguists, crackers, and astute minds on the planet. It appears that everyone is part of the game, whether you play or not.

Through the process I discovered a number of online cryptanalysis (and semi-related) tools that might be of interest to both the security neophyte and the more seasoned professional. The following list isn’t necessarily comprehensive, though it will provide you an introduction to a world that creates and solves complex obfuscation problems.

Multi Encoder/decoder: An online tool with multiple encode/decode options on a single page.

Rumkin Cipher Tools, possibly home to the broadest variant of online cipher tools on a single site.

CRYPtool-Online: Online interactive cryptography training, a free e-learning program, and exposure to a range of ciphers , coding methods, analysis tools, encryption and password tools.

From Richard Knight, a small set of effective online code breaking tools.

Robert Eisele’s Open source hacking projects.

Before I go much further down the programming path, you should probably be aware of MATLAB, [http://www.mathworks.com/products/matlab/online/] the ability to use a browser, iOS or Android system and collaborate while writing, debugging, or testing code. My son, an engineering student, and his friends pretty much live in MATLAB, making me feel like a neophyte.

Anagram Solver: Allow a computer to unjumble those letters into a meaningful word or phrase.

Binary to Text conversion: I always wanted to be able to speak directly to computers.

Hex to Ascii: Or to software developers and dump analyzers.

InverseGraphing Calculator: Draw that graph and the program will write the equations for you. This is particularly interesting if you are attempting to conceal simple content with complex mathematics.

Morse Code: Still a standard for learning the basics of electronic or mechanical language interpretation and translation.

Semaphore: Give yourself a little insight into symbolic systems by starting with the basics. (With a tip of the hat to my very first Scoutmaster, Mr. Wooling.)

Braille: Clearly, it’s not always about what you see. Patterns abound everywhere. Expand your senses.

Languages:

Although I knew some of these tools existed, I hadn’t considered using them to conceal information. Until a couple of puzzles combined both ciphers and language translators simultaneously. These tools would have simplified the efforts begun at Bletchley Park.

Google Translator

NATO Phonetic Alphabet

Unicode to Chinese

Russian Typewriter

Arabic Keyboard

Music

And while you are expanding beyond sight and touch, other frequencies are being used to conceal and transmit secured content.

Musical KeyBoard Frequencies

Finding Words in Phone Numbers

And looping back to where I began, most Geocaching clues are concealed using simple rotation ciphers. My children began learning them at a young age, and could almost read the messages without a translator. I wish my mind was so elastic.

Geocaching Ciphers

Or play with steganography by trying and open source tool. OpenPuff Steganography Tool

Tools for Android

Since Ancient Societies is associated with Google, more and more cipher tools are being enabled for mobile platforms. You can start with the Android based Cipher tool .

I plan to see what I can find for iOS mobile platforms next.

This list should give you several nice starting points.

01001000 01101111 01110000 01100101 00100000 01110100 01101111 00100000 01110011 01100101 01100101 00100000 01111001 01101111 01110101 00100000 01101001 01101110 00100000 01110100 01101000 01100101 00100000 01100011 01101100 01100001 01110011 01110011 01110010 01101111 01101111 01101101 00100000 01101111 01110010 00100000 01101111 01101110 01101100 01101001 01101110 01100101 00100001

Or should I say,

Hope to see you in the classroom or online!

Steven Fullmer
Interface Technical Training Staff Instructor

Steve teaches PMI-PBA: Business Analysis Certification,  PMP: Project Management Fundamentals and Professional CertificationWindows 10, and CompTIA classes in Phoenix, Arizona.

Videos You May Like

Government Edition – Encrypting a USB Flash Drive in Windows 10

0 271 2

In this video, Security Instructor Mike Danseglio demonstrates how to use BitLocker in Window 10 to secure files on a USB Flash drive that adhere to stricter data protection requirements as found inside Government entities. BitLocker 2-day instructor-led training is now available at Interface: BITLOCK: Planning and Deploying BitLocker Drive Encryption Training Video Transcription: Hi. … Continue reading Government Edition – Encrypting a USB Flash Drive in Windows 10

Encrypting a USB Flash Drive in Windows 10

1 451 3

Hi, my name is Mike Danseglio. I’m an instructor here at Interface Technical Training. I want to talk a little bit about encrypting USB flash drives with Windows 10. The concept of protecting data when it’s on a USB flash drive is not a new concept. BitLocker 2-day instructor-led training is now available at Interface: … Continue reading Encrypting a USB Flash Drive in Windows 10

CompTIA Security+ What Motivates People to Take Your Intellectual Property?

0 44 0

CompTIA Instructor Steve Fullmer describes the importance of getting Security+ Certified. Security is no longer about the “haves” and the “have nots” a small group of people who are trying to take advantage of your possessions and intellectual property (IP). In the book ‘Tribal Leadership’ by Dave Logan, John King, Halee Fischer-Wright, they discuss the stages of … Continue reading CompTIA Security+ What Motivates People to Take Your Intellectual Property?

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.