| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

CyberMachine

Page history last edited by James 13 years, 2 months ago

The CyberMachine.org encryption and decryption offers a very basic browser-based tool for encrypting and decrypting text. Encryption methods include 64-bit encryption, ASCII to binary, Caesar shift, l33t, and even pig latin. Users only need to input their text, select their encryption method, and click the 'go' button.

 

While this tool is free and accessible, the methods for encryption are relatively primitive. Further information and help is nonexistent, and additional data on the types of encryption available need to be researched externally. Short encryptions work fairly well, though encrypting and decrypting longer texts leads to large chunks of text improperly decrypted and scrambled. The inability to create a customizable key or password also limits the effectiveness of any security provided by the encryption.

 

This site may not be the most effective encryption or decryption tool, but it does demonstrate a strong correlation between language and mathematics through simple cryptography and text manipulation. From frequency analysis to sophisticated algorithms, mathematics plays a very important role in cryptography and have contributed to breakthroughs in translation. CyberMachine.org provides limited insight into encryption and decryption, and unintentionally demonstrates how easy it can be to botch those delicate and complicated processes.

 

 

  • Tools 4 Noobs offers a similar encryption and decryption tool with more sophisticated encryption methods, though frequently decrypting was unsuccessful and the manual is not particularly helpful for those not familiar with programming or cryptography. 
    • Encryption methods include Blowfish, DES, and Enigma.
    • Allows for key encryption. 
  • Any students interested in cryptography should consider reading The Code Book

 

Comments (0)

You don't have permission to comment on this page.