# Codes and Calculators

[Back] The following are a few challenges around codes:

## Encoding

• ASCII table. ASCII. This shows an ASCII table.
• UTF-16 table. UTF-16. This shows a UTF-16 table.
• ASCII, Hex, Base-64 and Binary convertor. ASCII. This involves a conversion between different formats.
• Hex, Decimal and Binary convertor. Hex, Dec and Bin. This involves a conversion between hex, decimal, octal and binary.
• Binary conversion. Binary. This does a basic binary conversion.
• Floating point conversion. Floating. This does a basic floating point conversion for binary values.

## Fundementals

• Frequency Analysis. Freq. This involves frequency analysis of text.
• Frequency Analysis (Example). Freq. This involves frequency analysis of text.

## Coding methods

These methods generally have some form of mapping that takes them from the plaintext to the ciphertext. Unfortunately knowing the conversion method leaves the code open to attack.

• Polybius Calculator. Polybius. This involves a conversion of Polybius code.
• One-Time Pad Calculator. OTP. This involves a conversion of OTP.
• Caeser. Caeser. This involves a conversion of Caeser.
• Scrambled. Scrambled. This involves a scrambled alphabet code.
• Pigpen Calculator. Pigpen. This involves a conversion of Pigpen.
• Homophonic Substition Code. Homophonic Substition. This involves Homophonic Substition coding.
• Morse Code. Morse Code. This involves Morse coding.
• Bacon Cipher. Bacon Cipher. This involves Bacon cipher.
• Atbash. Atbash. This involves atbash cipher.
• Rail Fence Cipher. Rail Fence. This involves Rail Fence cipher.
• Mary, Queen of Scots, polyalphabet cipher. Mary. This involves Mary's polyalphabet cipher.
• Dvorak. Dvorak. This involves Dvorak cipher.
• Huffman Coding. Huffman. This involves Huffman coding.
• ROT13 Cipher. ROT13. This involves ROT13 coding.
• Navajo Code Talkers. Navajo. This involves the Navajo Code Talkers code.
• QR Code. QR. This outlines the usage of QR codes.

## Key Coding

These methods generally have some form of mapping that takes them from the plaintext to the ciphertext, which changes with the usage of a special key. The key normally means that it is more secure than standard key-less methods, but they can be broken using methods such as brute-force

• Vigenère Calculator. Vigenère. This involves a conversion of Vigenère.
• Beaufort Calculator. Beaufort . This involves a conversion of Beaufort cipher.
• Bifid Cipher. Bifid. This involves Bifid coding.
• Ex-OR Coding. Ex-OR. This uses an EX-OR coding.
• Multiplication Code. Mult. This involves the Multiplication cipher.
• Pollux Code. Pollux. This involves the Pollux cipher.
• Hill's Cipher. Hill's. This involves the Hill ciper.
• Autokey Cipher. Autokey. This involves the Autokey ciper.
• Keyword Code . Keyword. This involves the Keyword code.
• Playfair. Playfair. This involves Playfair coding, which uses a 5x5 matrix, with a secret key to change the coding.

## Calculators

• Wireless (dBm, dBW and mW). dBm. This involves a conversion of wireless power.
• Voltage, Current and Resistance. V=IR. This involves a conversion of voltage, current and resistance.
• Power, Voltage and Current. P=VI. This involves a conversion of Power (W),Voltage (V),Current (I).
• Velocity, Distance and Time. v=s/t. This involves a conversion of Distance (s),Velocity (v),Time (t).
• Speed, Frequency and Wavelength. v=fλ. This involves a conversion of Speed (v),Frequency (f),Lamda (λ).
• Acceleration, Δspeed and Δtime. Accel. This involves a conversion of acceleration, change in v, and change in t.
• Force, Mass and Acceleration. F=ma. This involves a conversion of Force (F), Mass (m), and Acceleration (a).

## Basic Security Principles

• Secret splitting. Secret splitting. This gives an example of secret splitting.

## Simple equations

• I have Current and Resistance, and I want to calculate Voltage. V=IR. This involves a conversion of voltage, current and resistance.
• I have Voltage and Resistance, and I want to calculate Current. I=V/R. This involves a conversion of voltage, current and resistance.
• I have Voltage and Current, and I want to calculate Resistance. R=V/I. This involves a conversion of voltage, current and resistance.
• I have Voltage and Current, and I want to calculate Power. P=VI. This involves a conversion of power, voltage and current.
• I have Power and Voltage, and I want to calculate Current. I=P/V. This involves a conversion of power, voltage and current.
• I have Power and Current, and I want to calculate Voltage. V=P/I. This involves a conversion of power, voltage and current.
• I have Frequency and Wavelength, and I want to calculate Velocity. v=fλ. This involves a conversion of Speed (v),Frequency (f),Lamda (λ).
• I have Velocity and Wavelength, and I want to calculate Frequency. f=v/λ. This involves a conversion of Speed (v),Frequency (f),Lamda (λ).
• I have Velocity and Frequency, and I want to calculate Wavelength. λ=v/f. This involves a conversion of Speed (v),Frequency (f),Lamda (λ).
• I have Mass and Acceleration, and I want to calculate Force. F=ma. This involves a conversion of acceleration, change in v, and change in t.
• I have Δspeed and Δtime, and I want to calculate Acceleration. Accel. This involves a conversion of Force (F), Mass (m), and Acceleration (a).

## Others

• Inference. Infer. This involves the investigation of inference.
• Annual Loss Expectancy. ALE. This involves the investigation of Annual Loss Expectancy.

## Some tests

• Hex and binary test. Test. Hex/Binary.
• ASCII to Base64. Test. Convert from ASCII to Base64.
• ASCII to Base64. Test. Convert from ASCII to Base64.
• Caesar. Test. Caesar code.
• MD5. Test. MD5 code.