by Patrick Corgan
Version 1 (October 5, 2023)
Download (513 downloads)
This flow illustrates a simple cryptographic algorithm, and two different real-world applications of the algorithm. The algorithm takes a key word or phrase and a message and returns an encrypted message that can be decrypted with the same key.
This is a basic implementation that allows space, period, A-Z, and a-z. The flow is in four stand-alone parts, each of which is non-premium. If you don't have premium, you'll need to copy and paste the chunk you want into a new flow.
𝗚𝗲𝗻𝗲𝗿𝗮𝘁𝗲 𝗰𝗶𝗽𝗵𝗲𝗿 𝘁𝗮𝗯𝗹𝗲
This will generate the cipher table, which the algorithm uses to swap characters. This is included primarily so you can add more characters. If you do modify the character set, be sure to update the 'letters' variable in the decryption algorithm appropriately, and change the regex in the message input dialogs.
Alternatively, you can add characters to the 'CIPHER_TABLE' variable manually (make the above noted changes as well). Be sure to follow the pattern of a square table whose rows are the same characters in the same order as in the columns.
Note that this will take a few minutes to run.
𝗖𝗶𝗽𝗵𝗲𝗿 𝗲𝗻𝗴𝗶𝗻𝗲
This is the encryption and decryption engine. Using this you can encrypt anything, as long as the characters you are encrypting are in the cipher table.
𝗖𝗶𝗽𝗵𝗲𝗿 𝗻𝗼𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻
This provides a notification-based wrapper to the engine. From the notification you can choose to encrypt text or decrypt a message.
𝗦𝗠𝗦 𝗰𝗶𝗽𝗵𝗲𝗿 𝗶𝗻𝘁𝗲𝗴𝗿𝗮𝘁𝗶𝗼𝗻
This a meatier application of the engine. This will allow you to send an encrypted message over SMS, and will allow you to decrypt a message with the proper header. The flow simply waits for a text to come in that begins "[ABC]", and treats the remaining characters as an encrypted message. Sent messages are prepended with "[ABC]" to identify them as encrypted.
𝗔 𝗻𝗼𝘁𝗲 𝗼𝗻 𝗰𝗿𝘆𝗽𝘁𝗼𝗴𝗿𝗮𝗽𝗵𝗶𝗰 𝘀𝘁𝗿𝗲𝗻𝗴𝘁𝗵
Despite Lewis Carroll's assurance that this cipher is "unbreakable", it hasn't been secure since 1863. You're safe from a smartass who thinks he's Alan Turing because he's read "The Adventure of the Dancing Men", but that's about it. Methods do exist to make it more secure, most having to do with strengthening the key. More:
https://www.wikipedia.org/wiki/Vigen%C3%A8re_cipher
This flow is based on "The Alphabet-Cipher" created by Lewis Carroll.
------------------------------
𝘉𝘺 𝘗𝘢𝘵𝘳𝘪𝘤𝘬 𝘊𝘰𝘳𝘨𝘢𝘯
🛠️𝕔𝕠𝕞𝕞𝕖𝕟𝕥𝕤 𝕒𝕟𝕕 𝕔𝕣𝕚𝕥𝕚𝕔𝕚𝕤𝕞𝕤 𝕨𝕖𝕝𝕔𝕠𝕞𝕖⚒️
------------------------------
5 stars | 3 | |
4 stars | 0 | |
3 stars | 0 | |
2 stars | 0 | |
1 star | 0 | |
Reports | 0 |
Rate and review within the app in the Community section.