by Patrick Corgan
Version 1 (August 28, 2022)
Download (394 downloads)
𝘉𝘺 𝘗𝘢𝘵𝘳𝘪𝘤𝘬 𝘊𝘰𝘳𝘨𝘢𝘯
This flow illustrates a simple cryptographic algorithm, and two different real-world applications of the algorithm. The algorithm takes a key word or phrase and a message and returns an encrypted message that can be decrypted with the same key.
This is a basic implementation that allows space, period, A-Z, and a-z. The flow is in four stand-alone parts, each of which is non-premium. If you don't have premium, you'll need to copy and paste the chunk you want into a new flow.
𝗚𝗲𝗻𝗲𝗿𝗮𝘁𝗲 𝗰𝗶𝗽𝗵𝗲𝗿 𝘁𝗮𝗯𝗹𝗲
This will generate the cipher table, which the algorithm uses to swap characters. This is included primarily so you can add more characters. If you do modify the character set, be sure to update the 'letters' variable in the decryption algorithm appropriately, and change the regex in the message input dialogs.
Alternatively, you can add characters to the 'CIPHER_TABLE' variable manually (make the above noted changes as well). Be sure to follow the pattern of a square table whose rows are the same characters in the same order as in the columns.
Note that this will take a few minutes to run.
This is the encryption and decryption engine. Using this you can encrypt anything, as long as the characters you are encrypting are in the cipher table.
This provides a notification-based wrapper to the engine. From the notification you can choose to encrypt text or decrypt a message.
𝗦𝗠𝗦 𝗰𝗶𝗽𝗵𝗲𝗿 𝗶𝗻𝘁𝗲𝗴𝗿𝗮𝘁𝗶𝗼𝗻
This a meatier application of the engine. This will allow you to send an encrypted message over SMS, and will allow you to decrypt a message with the proper header. The flow simply waits for a text to come in that begins "[ABC]", and treats the remaining characters as an encrypted message. Sent messages are prepended with "[ABC]" to identify them as encrypted.
𝗔 𝗻𝗼𝘁𝗲 𝗼𝗻 𝗰𝗿𝘆𝗽𝘁𝗼𝗴𝗿𝗮𝗽𝗵𝗶𝗰 𝘀𝘁𝗿𝗲𝗻𝗴𝘁𝗵
Despite Lewis Carroll's assurance that this cipher is "unbreakable", it hasn't been secure since 1863. You're safe from a smartass who thinks he's Alan Turing because he's read "The Adventure of the Dancing Men", but that's about it. Methods do exist to make it more secure, most having to do with strengthening the key. More:
This flow is based on "The Alphabet-Cipher" created by Lewis Carroll.
⚡𝘊𝘰𝘯𝘴𝘵𝘳𝘶𝘤𝘵𝘪𝘷𝘦 𝘤𝘰𝘮𝘮𝘦𝘯𝘵𝘴 𝘢𝘯𝘥 𝘤𝘳𝘪𝘵𝘪𝘤𝘪𝘴𝘮𝘴 𝘢𝘳𝘦 𝘢𝘭𝘸𝘢𝘺𝘴 𝘸𝘦𝘭𝘤𝘰𝘮𝘦. 𝘛𝘩𝘢𝘯𝘬 𝘺𝘰𝘶!⚡
Rate and review within the app in the Community section.