Skip to main content
We’ve updated our Terms of Service. A new AI Addendum clarifies how Stack Overflow utilizes AI interactions.

Questions tagged [encryption]

This challenge is about or related to encoding a plaintext, usually with one or more keys.

Filter by
Sorted by
Tagged with
5 votes
14 answers
1k views

Mulenère cipher is a version of Vigenère ciphers, which uses multiplication instead of addition. Algorithm It's simple. First, the password will repeated as much as reach a size bigger than length of ...
QOO-OOKALAN's user avatar
1 vote
0 answers
189 views

We need to produce a block cipher round function with a 1 bit round key size and a 7 bit message size with the highest level of cryptographic security according to our measure of security. ...
Joseph Van Name's user avatar
12 votes
16 answers
3k views

Problem You are tasked with creating a program that performs emoji encryption on a given string of emojis. In this encryption scheme, each emoji is replaced by a unique character (from ...
3.14's user avatar
  • 403
7 votes
8 answers
422 views

Given a permutation of the alphabet and an input string, encrypt the input string by replacing all characters with the one's you've been given. The capitalization should be kept the same and non-...
0xff's user avatar
  • 849
4 votes
6 answers
649 views

This is alternate of a rip-off of a rip-off of a rip-off of a rip-off of a rip-off of a rip-off. Go upvote those! Your task, if you accept it, is to write a program/function that outputs/returns its ...
okie's user avatar
  • 1,807
13 votes
8 answers
1k views

Note This is the decryption challenge. The encryption challenge can be found here. Challenge The challenge is to decrypt a given string, using the rules as specified below. The string will only ...
Manish Kundu's user avatar
  • 5,350
34 votes
40 answers
4k views

This challenge is inspired by one of my other challenges: Pointlessly make your way down the alphabet That challenge asked you to take a string of text, and for each letter produce a sequence of ...
AJFaraday's user avatar
  • 11.8k
12 votes
8 answers
4k views

The objective Given a Russian text, encrypt it with Caesar cipher with key 16. The basic Cyrillic alphabets The basic Cyrillic alphabets are: (U+0410 – U+042F) ...
Dannyu NDos's user avatar
  • 7,371
15 votes
8 answers
1k views

Note This is the encryption challenge. The decryption challenge can be found here. Challenge The challenge is to encrypt a given string, using the rules as specified below. The string will only ...
Manish Kundu's user avatar
  • 5,350
8 votes
3 answers
1k views

You and your friend want to send each other secret messages. However, because you are conspiracy theorists and think that the government has a quantum computer that can crack any standard encryption. ...
Gryphon's user avatar
  • 7,305
18 votes
5 answers
795 views

Let's say you have some text, and you want it to send it to your friend, but you don't want anyone else to read it. That probably means you want to encrypt it so that only you and your friend can ...
Wheat Wizard's user avatar
  • 103k
20 votes
11 answers
1k views

Overview Your goal is to implement RC4 encryption. RC4 encryption, invented by Ron Rivest (of RSA fame), was designed to be secure, yet simple enough to be implemented from memory by military ...
Daffy's user avatar
  • 1,075
20 votes
16 answers
3k views

Your task is to take an encrypted string as input, and output the string decrypted, to reveal its hidden message. The strings, both the input and output, will contain characters from this list of 64 ...
Stewie Griffin's user avatar
4 votes
3 answers
898 views

The Straddling Checkerboard is a method for converting letters to numbers and was part of a pencil an paper cipher known as VIC To convert letters to numbers first you have to make a checkboard like ...
marcosm's user avatar
  • 1,166
15 votes
2 answers
983 views

This challenge carries a bounty of 200 points for the first to answer and remain unbeaten for at least 3 days. Claimed by user3080953. There's a lot of talk lately about end-to-end encryption, and ...
Dave's user avatar
  • 8,569
4 votes
2 answers
399 views

Challenge Given a string with any characters a-z or A-Z, return an 'encrypted' string, where all characters are replaced by the character next to it (assuming a QWERTY keyboard). Case (uppercase, ...
user avatar
13 votes
19 answers
1k views

Implement this key cipher Goal Use the algorithm (explained in the Algorithm section) to implement a certain cipher. The program must read input from STDIN or the closest available equivalent, use the ...
m654's user avatar
  • 837
-2 votes
1 answer
303 views

Encrypting Challenge Your encrypting program must be able to do following things: Input password Generate random key Encrypt random key with set key Then, the decrypting program must be able to these ...
univalence's user avatar
  • 1,669
34 votes
2 answers
4k views

The Enigma machine is a fairly complex cipher machine used by the Germans and others to encrypt their messages. It is your job to implement this machine*. Step 1, Rotation Our enigma machine has 3 ...
Nathan Merrill's user avatar
8 votes
1 answer
822 views

An illegal prime is a prime number which encodes information that is illegal to possess - specifically, in one case, a gzip file of the source code of DeCSS, a piece of software to decrypt copy-...
Joe Z.'s user avatar
  • 35.4k