Key

XOR Cipher is a type of additive cipher, an encryption algorithm that operates according to the principles:

*A 0 = A,**A A = 0,**A B = B A,**(A B) C = A (B C),**(B A) A = B 0 = B,*

For example where $}$ denotes the exclusive disjunction (XOR) operation. This operation is sometimes called modulus 2 addition (or subtraction, which is identical). With this logic, a string of text can be encrypted by applying the bitwise XOR operator to every character using a given key. To decrypt the output, merely reapplying the XOR function with the key will remove the cipher.

Hash and compare text string using Bcrypt. Bcrypt Hash Generator & Verifier could generate and verify Bcrypt hash strings.

A1Z26 Cipher, is a simple substitution cipher that replaces each letter of the alphabet with its corresponding numerical position in the alphabet.

ADFGVX Cipher is a transposition and substitution cipher used during World War I by the German Army. The name "ADFGVX" comes from the six possible letters used in the cipher: A, D, F, G, V, and X.

The ADFGX Cipher is a fractionating transposition cipher which combined a modified Polybius square with a single columnar transposition. It is closely related to the ADFGVX Cipher.