A null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material. Today it is regarded as a simple form of steganography, which can be used to hide ciphertext.
There are various options of using the Null Cipher. Here we are taking the first letter from each word successively. The pattern can be chosen to increase the cryptography level Other options can be:
- Taking last letters from each word.
- Taking the letter from the particular position
- Using the pattern (1, 2, 3, 1, 2, 3 [each letter in each word]). You can use some other pattern also.
- Positing of the significant letters next to or at certain intervals from punctuation marks or particular characters.
Null Cipher taking the first letter from each word successively
More Examples of messages containing null ciphers:
Input will be one paragraph or sentence without any newline. Input : News Eight Weather: Tonight increasing snow. Unexpected precipitation smothers eastern towns. Be extremely cautious and use snowtires especially heading east. The [highway is not] knowingly slippery. Highway evacuation is suspected. Police report emergency situations in downtown ending near Tuesday. Explanation: Taking the first letter in each word successively yields the real message. Here we are converting decoded message to lowercase. News Eight Weather: Tonight Increasing Snow. Unexpected Precipitation Smothers Eastern Towns. Be Extremely Cautious And Use Snowtires Especially Heading East. The [Highway Is Not] Knowingly Slippery. Highway Evacuation Is Suspected. Police Report Emergency Situations In Downtown Ending Near Tuesday. Output : After Deciphered : newtisupsetbecausehethinksheispresident After breaking the words manually the output will be: Newt is upset because he thinks he is President
Enciphered Message: asbsgfppbg
This article is contributed by Sachin Bisht. If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
- Difference between Monoalphabetic Cipher and Polyalphabetic Cipher
- XOR Cipher
- Substitution Cipher
- Vigenère Cipher
- ROT13 cipher
- Feistel Cipher
- Keyword Cipher
- Baconian Cipher
- Hill Cipher
- Program to check if the String is Null in Java
- Vernam Cipher in Cryptography
- Caesar Cipher in Cryptography
- Bifid Cipher in Cryptography
- Playfair Cipher with Examples
- Implementing Atbash Cipher
- Polybius Square Cipher
- Implementation of Affine Cipher
- Columnar Transposition Cipher
- Latin alphabet cipher
- Autokey Cipher | Symmetric Ciphers